I haven’t met an organization yet that isn’t interested in saving money and optimizing their cloud spend. That’s where Azure Reserved Instances (RIs) come in. Properly leveraged, Reserved Instances, particularly Virtual Machine Reserved Instances can result in some significant savings. In fact, it was the topic of discussion at one of our recent Daymark Cloud Clinics where our technical cloud consultants offer free technical training and tips on a wide range of Azure and Office 365 features.
Read More
Mimecast held their 2020 Cyber Resilience Summit remotely this year covering a wide range of topics. You can read our previous blog “Mimecast Cyber Resilience Summit 2020 – Key Takeaways” for those highlights. In addition, Mimecast provided some alarming data on the pandemic threat reality that we are facing.
Mimecast collected 100 days of detection data from January 2020 to April 2020. The results below reveal a 36.9% INCREASE in threat detections, where the key focus of threat actors has become high volume Spam and Impersonation. Here’s the breakdown:
Read More
Mimecast held their 2020 Cyber Resilience Summit remotely this year, providing some interesting updates to their suite of cyber security tools. As a leading Email Security Gateway, Mimecast has expanded their portfolio over the last few years into a more robust and comprehensive framework that they have dubbed “Email Security 3.0”.
The Email Security 3.0 Framework can be broken out into three zones of protection:
Zone 1: Perimeter – This is your traditional email delivery path and is saturated with relentless attacks. In order to protect against these threats, Mimecast leverages their advanced Targeted Threat Protection including impersonation protection, attachment sandbox, and URL Protection.
Read MoreOn July 16, 2020, the European Court of Justice (ECJ – the EU’s high court) invalidated the EU-US Privacy Shield Framework as a potential mechanism for meeting the GDPR's cross-border personal data transfer restrictions.
Effective immediately, U.S. companies that process EU “personal data” can no longer rely on registration under the Privacy Shield and must establish an alternative legal basis for any continued EU-US transfers.
Previously, cross-border transfers to the US were permitted under three mechanisms: 1) the Privacy Shield (http://privacyshield.gov), 2) Standard Contractual Clauses (SCC), and 3) Binding Corporate Rules (BCR).
Read MoreConditional Access in Azure AD provides a level of security required to maintain appropriate controls over who can access confidential and privileged information. It was the topic of discussion at our most recent “Ask the Engineer Q&A Roundtable” where attendees learned tips for a successful Conditional Access deployment and got answers to their specific questions.
Read MoreIt’s a crazy time out there. Businesses have been mandated by state governments to enable employees to work from home. Literally overnight, there have been massive shifts to connect people remotely. Suddenly even your grandparents know what Zoom is!
Microsoft Teams is playing an integral part in facilitating remote communication and collaboration. Most companies with Office 365 subscriptions already have licenses for this product, but just now are really rushed to enable Teams for the massive increase of remote workers.
Read MoreAs we all strive to adjust to the changes that coronavirus has brought to our lives in the past several weeks, I wanted to share some tips about self-care and coping in these uncertain times. Here are a few tips and suggestions for managing stress and staying balanced:
Read MoreIn today’s multi-vendor, multi-cloud world, managing IT maintenance contracts can easily spiral out of control. Not having a full grasp of where they all stand can be costly in terms of both budget and vulnerabilities from out of support equipment and software.
We’ve identified seven questions that every IT organization should ask to truly understand if their maintenance management is fully optimized:
Read MoreEvery IT professional already knows that the proliferation of log files generated by Security Information and Event Management (SIEM) solutions can be overwhelming to manage. There are multiple SIEM tools that analyze and automate this tremendous amount of data to provide alerts that help troubleshoot network issues, quickly remediate threats, and identify potential non-compliance vulnerabilities.
Read MoreOn February 11 2020, Microsoft released a patch for Exchange Servers that would fix a vulnerability pertaining to unauthorized access to the backend of the Exchange Control Panel. There is now confirmation from a source at the United States Department of Defense that multiple nation-state backed actors and other ransomware gangs are actively and maliciously exploiting this vulnerability on unpatched systems. The vulnerability results from the Exchange Server failing to properly create unique cryptographic keys at the time of installation. The hackers’ sophisticated exploits circumvent encryption, granting them full access of the server.
It is imperative that the latest patches from February 11th be applied as even a single Exchange instance puts you at risk.
Read MoreSubscribe to Daymark Insights
Latest Posts
Browse by Tag
- Cloud (70)
- Security (45)
- Microsoft (44)
- Azure (36)
- Partners (32)
- Data Protection (30)
- Data Center (28)
- Backup (25)
- Daymark News (23)
- Compliance (22)
- Storage (20)
- Data Governance (19)
- Veritas (18)
- Virtualization (18)
- CMMC (16)
- Cybersecurity (15)
- Disaster Recovery (14)
- Cloud Backup (13)
- Managed Services (13)
- Government Cloud (12)
- Featured Gov (9)
- GCC High (9)
- Industry Expertise (9)
- AI (8)
- Networking (6)
- Hybrid Cloud (5)
- NIST SP 800-171 (3)
- Reporting (3)
- Services (3)
- Cloud Security (2)
- Copilot for Microsoft 365 (2)
- GDPR (2)
- Pure Storage (2)
- Mobile (1)
- Reporting-as-a-Service (1)



