Legal Loudspeaker Blog

­­­­­­­­­­­NGAV (Next-Generation Antivirus) In this edition of Cybersecurity Terms & Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined NGAV (Next-Generation Antivirus). Next-Generation Antivirus takes traditional antivirus software to a new, advanced level of endpoint security protection. NGAV is the natural (and much needed) evolution of traditional Antivirus that protects computers from the full spectrum of modern cyber attacks, without any extra CPU resources. NGAV speaks to a fundamentally different technical approach in…
­­­­­­­­­­­Pen Test (Penetration Testing) In this edition of Cybersecurity Terms & Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined Pen Test (Penetration Testing). A Pen Test can also be referred to as ethical hacking. This is the act of testing a device, network, or web application for exploitable security vulnerabilities. There are several different types of penetration testing.  The goal of most pen tests is to gain elevated privilege in the environment…
­­­­­­­­­­­Vulnerability Management When talking about cybersecurity, terms can sometimes be hard to understand. Vulnerability Management, pen testing, and least privilege access are some examples of cybersecurity terms you may have heard or read about.  In this blog series, we will define these terms and what they mean for your organization. In the first part of our blog series, Cybersecurity Terms and Definitions, Accellis Technology Group Director of Cybersecurity, Tom Fazio has defined Vulnerability Management. Vulnerability…
Email Account Takeover: Defending Against Lateral Phishing Accellis Technology Group’s trusted partner, Barracuda has released Volume 2 of the Spear Phishing: Top Threats and Trends report, Email Account Takeover: Defending Against Lateral Phishing. Barracuda defines lateral phishing as an effective way for attackers to leverage legitimate accounts compromised through email account takeover. The report takes an in-depth look at the latest tactics used by scammers and how to protect your business. According to a…
How To Spot A Phishing Email Webinar We recently hosted How To Spot A Phishing webinar with Accellis Director of Cybersecurity, Tom Fazio. In this webinar, Tom discusses what a phishing email is, how hackers get your email, email subject lines to look out for, the difference between phishing and spear-phsihing, and much more. Listed below is a topic timeline. 0:000:43 – Tom Fazio Background 0:444:04 – What is Phishing? How…
Microsoft OneDrive Overview Webinar We recently hosted a Microsoft OneDrive Overview webinar with Accellis Senior Software Consultant, John Roth II. In this webinar, John covers many of the amazing features that OneDrive offers end-users such as untethered mobile capability, anywhere access, seamless collaboration, syncing and sharing options. John also covers the similarities and differences of OneDrive and SharePoint Online. Listed below is a topic timeline. 0:001:10 – Webinar Overview 1:112:38 –…
Microsoft Releases New SharePoint Online Features In case you missed the  announcement from Microsoft earlier this month, the tech giant has released new SharePoint Online features, including a Site Swap Capability, along with new SharePoint and OneDrive features for end-users. Site Swap Capability: The Site Swap capability is for IT pros maintaining SharePoint Online tenancies. The announcement from Microsoft included an interview with Wayne Ewington, a program manager on OneDrive and SharePoint team. According to…
Microsoft 365 Business Part 3: Security & Compliance Features Many small and medium-sized businesses (SMBs) are concerned about their ability to protect their business from cyberattacks and keep their data safe—but lack basic protection against the most common threats. (Microsoft Security Blog) Part 3 of this blog series will highlight some of the core security features that Microsoft 365 Business offers. lynda.com Office 365 Advanced Threat Protection Plan 1 Microsoft Office 365 Advanced Threat Protection…
Microsoft 365 Business Part 2: Azure Active Directory Azure Active Directory (“Azure AD”) replaces a traditional physical Active Directory domain server (AD DS), allowing you to subscribe to it as a fully packaged service (PaaS) with no hardware and software expenditure upfront, no ongoing maintenance, and no backup and disaster recovery expense. Azure Active Directory (“Azure AD”) comes in four editions—Free, Basic, Premium P1, and Premium P2. The Free edition is included in your…
Microsoft 365 Business: Part 1 As a member of the Microsoft Partner Network, we will explain the benefits, tools, and solutions that Microsoft 365 Business offers. This will be a 3-part blog series to educate and provide support with Microsoft 365 Business. What is Microsoft 365 Business? Microsoft 365 Business is a “platform-as-a-service” (PaaS) hosted, maintained, secured, and backed up by Microsoft Corporation across geographically redundant data centers. It provides an entire ecosystem of…