Categories
Cyber Security Microsoft

Security beyond Microsoft products

With Microsoft, security can be simple once again. Microsoft 365 provides an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch the video to learn more.

Categories
Microsoft

The Ultimate Meeting Guide

How could your employees benefit if you improved your businesses everyday meetings?

With meeting best practices, you can improve your company’s bottom line and value your employees’ time.

Sounds good, right? Check out this eBook for more information on how to achieve simple, direct meetings focused on clear action items.

Want to improve your employees communication in all aspects across your business? Contact our team to learn how we can help level up your communication game.

View: The Ultimate Meeting Guide

Categories
Microsoft

Digital Transformation in the Oil & Gas Industry: Collect and Monitor Sensor Data

At oil and gas facilities, data from sensors and cameras must be collected, analyzed and visualized economically in order to keep operations running smoothly. Watch this Lizo video to see how the Power BI application allows remote decision-making—significantly reducing overhead cost and achieving operational efficiency.

Categories
Microsoft

Security intelligent infographic

Identify and repel more threats than ever before with Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. Take a look to learn more about intelligent security solutions for your entire enterprise.

View: Security intelligent infographic

Categories
Cyber Security

New Chrome 0-day vulnerability, update your browser now

Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to hijack targeted computers.

Tracked as CVE-2020-15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open source software development library for rendering fonts that comes packaged with Chrome.

The vulnerability was discovered and reported by security researcher Sergei Glazunov of Google Project Zero on October 19 and is subject to a seven-day public disclosure deadline due to the flaw being under active exploitation.

Categories
Cyber Security

Time to update to ios 14.2

Apple released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild.

Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges.

The zero-days were discovered and reported to Apple by Google’s Project Zero security team.

“Apple is aware of reports that an exploit for this issue exists in the wild,” the iPhone maker said of the three zero-days without giving any additional details so as to allow a vast majority of users to install the updates.

The list of impacted devices includes iPhone 5s and later, iPod touch 6th and 7th generation, iPad Air, iPad mini 2 and later, and Apple Watch Series 1 and later.

According to Apple’s security bulletin, the flaws are:

  • CVE-2020-27930: A memory corruption issue in the FontParser library that allows for remote code execution when processing a maliciously crafted font.
  • CVE-2020-27932: A memory initialization issue that allows a malicious application to execute arbitrary code with kernel privileges.
  • CVE-2020-27950: A type-confusion issue that makes it possible for a malicious application to disclose kernel memory.

Categories
Microsoft

Customer Story: Clifton Coffee

Clifton Coffee Roasters (CCR) is a popular coffee company that profited from the recent boom in café culture. As Clifton Coffee Roasters’ business grew, so did the company leaders’ ambitions. They credit digital business and communication tools from Microsoft with helping them to grow and scale their business. Now, they provide additional services like technical support and delivery service to coffee shops across the UK. Check out this video to see how Clifton Coffee Roasters upgraded their teamwork strategy to grow their business.

Categories
Microsoft

Collaborate better with Microsoft Teams. Subscribe to learn more.

Today’s global workforce relies on technology to push forward revenue-generating projects. Now more than ever, finding the correct workplace tools is becoming a crucial part of every organization’s digital transformation strategy.

Subscribe now to discover how Microsoft Teams is delivering tangible, scalable benefits to companies worldwide. Additionally, learn how Microsoft technologies can empower your business to become a local, regional, or global leader by driving increased efficiency and superior collaboration.

View: Collaborate better with Microsoft Teams. Subscribe to learn more.

Categories
Microsoft

Lizo | Transformation in the oil & gas industry: data analysis and visualization

Data. There’s a lot of it, and it’s everywhere. Azure cloud services helps organizations manage all aspects of their volumes of data. Here is an example of how a company in the oil and gas industry could utilize Azure Cosmos DB for data acquisition and Power BI for rich analytics with real-time insights. Through partnering with Microsoft, a company like Lizo would be able to actualize their vision of next-generation data analysis and visualization. Watch this and look for additional Lizo videos to demonstrate the capabilities and power of Azure!

Categories
Microsoft

Security Solution Overview

With data growing increasingly valuable and harder to protect, Microsoft provides security solutions across identity and access management, information protection, threat protection and security management. Harness integrated, comprehensive security with Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel to identify and repel more threats than ever before and safeguard your organization, without sacrificing productivity.