As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
Category: Business Process
Transformation at Phillip Jeffries: A Success Story with ArcherPoint
In the ever-evolving world of information technology, finding the right partner can make all the difference. At Phillip Jeffries, a leading wall-covering importer, manufacturer, and distributor based in Fairfield, New Jersey, the journey to IT excellence has been nothing short of transformative. Join us as we delve into the experiences of Lars Anderson, Vice President… Continue reading Transformation at Phillip Jeffries: A Success Story with ArcherPoint
Why Gogo Business Aviation Trusts ArcherPoint
Reliable and efficient ERP solutions are crucial in the fast-paced aviation industry. Amol Markandeya and Justin Reedy, ERP developers at Gogo Business Aviation, share their positive experiences with ArcherPoint, a trusted partner who has significantly improved their operations. Challenges with previous partner Before partnering with ArcherPoint, Gogo Business Aviation faced two major issues with their… Continue reading Why Gogo Business Aviation Trusts ArcherPoint
Empower Financial Teams with Modern BI Tools for Actionable Insights
Businesses today face increasing competition and agile disruptors. Decision-makers must react to rapidly changing market conditions and need up-to-the-minute data to make informed decisions. Traditional, manual processes like generating reports via Excel spreadsheets are inefficient, error-prone, and often fail to provide the actionable insights needed for strategic decision-making. Relying on these types of outdated methods… Continue reading Empower Financial Teams with Modern BI Tools for Actionable Insights
Understanding the Benefits of Internal and External Cybersecurity Risk Assessments
Businesses face many cybersecurity threats, ranging from ransomware attacks to sophisticated phishing schemes. The cost of a cyberattack can extend far beyond financial loss, including an adverse impact on the company’s reputation and brand, the imposition of regulatory fines, and an erosion of customer trust. One effective strategy for identifying and mitigating these risks is… Continue reading Understanding the Benefits of Internal and External Cybersecurity Risk Assessments
Microsoft Introduces Changes to Make SaaS Updates More Flexible
Implementing Microsoft Dynamics 365 Business Central SaaS helps to ensure that customers can stay current with their ERP software version. However, software updates can be disruptive. With the latest Business Central release (Business Central 2024, Wave 2, or BC 25), Microsoft has introduced new changes that affect how updates are managed, making them more flexible… Continue reading Microsoft Introduces Changes to Make SaaS Updates More Flexible
Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data
The blog post “Highway Blobbery: Data Theft Using Azure Storage Explorer” (ModePush, 2024) highlights how threat actors exploit legitimate tools like Azure Storage Explorer and AzCopy for data exfiltration. Attackers leverage these tools to transfer large datasets from compromised environments, often bypassing traditional detection methods. Understanding Azure Storage Explorer and AzCopy Azure Storage Explorer is… Continue reading Identify Threat Actors that Use Azure Storage Tools to Ransom Sensitive Data
The CrowdStrike Outage: What Happened and Lessons Learned
CrowdStrike is a leading cybersecurity company that provides cloud-based endpoint protection, threat intelligence, and incident response services to companies of all sizes worldwide. On July 19, 2024, CrowdStrike uploaded a flawed update to its Falcon Endpoint Detection and Response (EDR) software. The problem caused Windows devices to display Microsoft’s “Blue Screen of Death” (BSOD). In… Continue reading The CrowdStrike Outage: What Happened and Lessons Learned
It’s Cybersecurity Awareness Month. Do You Know Where Your Passwords Are?
The combination of username and password alone, the standard for online security for decades, has shown that it is woefully inadequate to combat cyberattacks. Passwords are easily compromised Passwords alone are insufficient for protecting sensitive data primarily due to users’ lack of security hygiene and aggressive attacks by cybercriminals. The common problem in these situations… Continue reading It’s Cybersecurity Awareness Month. Do You Know Where Your Passwords Are?
Common (and Some Uncommon) Scenarios for Service Management in Business Central
Service Management in Business Central provides features to help businesses maintain warranty and service contracts, including inventory tracking for the parts and supplies needed to fulfill maintenance contracts. Service Management can be used to maintain high service levels in warranty commitments and maintenance contracts, including on-site and remote service, spare and replacement part tracking, and… Continue reading Common (and Some Uncommon) Scenarios for Service Management in Business Central