Is my perception of improved security by restricting access to an MS365 tenant/associated apps on per-device basis misguided? Why?

Receiving guidance from a contractor that restricting unknown devices (regardless of MFA, location, etc.) to an Azure tenant does not improve security in any meaningful way, and just creates a headache for the administrator who needs to ru… Continue reading Is my perception of improved security by restricting access to an MS365 tenant/associated apps on per-device basis misguided? Why?

Is it possible that a company is able to detect if an employee copies files to a USB drive? [closed]

For a large company using MacOS, is it possible this company is able to detect if an employee copies files to a USB drive?
I haven’t checked to see if system logs log that by default or can log USB getting plugged in and files getting cop… Continue reading Is it possible that a company is able to detect if an employee copies files to a USB drive? [closed]

Can a ransomware attack succeed with no root privileges, but instead if it does have privileged user access?

If an attacker succeeds in getting the password of an IT support privileged account (that has Domain Control rights), can he successfully carry out the attack and do the lateral movement needed between the Domain Controllers and/or users?
Continue reading Can a ransomware attack succeed with no root privileges, but instead if it does have privileged user access?

Cyber Essentials at a small business (20 employees) that keeps all business data within SaaS

Background
I’ve recently joined a rapidly growing small business (from 4 to 20 people in last 12 months) with a very DIY IT setup. It’s fallen to me (I’m a developer so I just happen to be sitting nearest IT world…) to improve their secu… Continue reading Cyber Essentials at a small business (20 employees) that keeps all business data within SaaS