• Insights & Client Success Stories

    Search All

Displaying 1-15 of 79
1 2 3 4 5
View 9
  • View 9
  • View 28
  • View 56
Relevance
  • Relevance
  • Most Recent
  • A-Z
  • Z-A

If it isn’t already, cybersecurity should likely be on your board agenda at every meeting.

Read More

BDO Digital now offers demand generation solutions to support your organization’s growth goals.

Read More

Throughout 2020, BDO Digital worked with Microsoft to produce a number of informative webinars to help companies meet the challenges of this tumultuous year. Webinars covered topics such as Managi...

Read More

The abrupt shift to remote work caused by the COVID-19 pandemic forced insurance companies to overhaul their cybersecurity strategies almost overnight. Companies in every industry have faced an inc...

Read More

Businesses have faced many acute challenges in 2020, and cyber threats rank high on that list. The COVID-19 pandemic brought abrupt business interruption and drastic revenue changes for many indus...

Read More

Businesses have faced many acute challenges in 2020, and cyber threats rank high on that list. The COVID-19 pandemic brought abrupt business interruption and drastic revenue changes for many indus...

Read More

The onset of the global coronavirus pandemic coincided with a sharp rise in the number of cyber-attacks that have impacted organizations of all sizes across industries. Private equity firms are inc...

Read More

Family Offices outsource their information technology (IT) services to either local small IT firms or large professional services companies. As a result, the level of cybersecurity expertise availa...

Read More

All too often companies move to digitally transform data without a strategic or proactive approach to cybersecurity and data privacy. As a result of the COVID-19 pandemic, there has been a dramatic...

Read More

Businesses, their partners, vendors, and end users have been forced to rapidly change the way they work and utilize technology in response to the work from home mandate imposed by the COVID-19 pand...

Read More

Due to COVID-19 and the shelter-in-place policies, organizations are implementing remote work where possible, but for some, it’s not sustainable. The common reaction to the economic downturn tends ...

Read More

Digital Transformation in the Pandemic and Post-Pandemic Era If there were any lingering doubts about the necessity of digital transformation to business longevity, the coronavirus has silenced t...

Read More

The COVID-19 pandemic has compelled many organizations to adapt to the new normal of a remote workforce. This new environment brought on additional challenges that IT, legal and compliance and remo...

Read More

Application consolidation is not likely to be a top of mind item to consider in the middle of a global pandemic such as COVID-19. However, coming out of the current state, organizations will need t...

Read More

COVID-19 has rapidly and irrevocably reshaped the global business climate. Virtually overnight, restaurants and bars have shuttered their doors to customers, transitioning to delivery and take-ou...

Read More

While video conferencing is not a new concept, the novel coronavirus (COVID-19) has caused the demand for virtual communication to be at an all-time high. As a result, many organizations had to man...

Read More

The spread of COVID-19 has pushed many organizations to adopt remote work policies. This influx in remote work has created a gap in cybersecurity standards and it’s becoming a growing concern. Cybe...

Read More

The COVID-19 outbreak could have a direct and lasting impact on organizations of all sizes. As the number of novel coronavirus (COVID-19) cases continue to climb both in the U.S. and across the...

Read More

About Microsoft Compliance Manager Microsoft Compliance Manager is an ongoing risk assessment tool that centralizes compliance activities. Keeping compliant is easy with Compliance Manager’s dash...

Read More

The Gartner Magic Quadrant recognizes Microsoft as a top provider of Endpoint Protection Platforms. Their latest product offerings prove they have risen to the challenge that today’s threat landsc...

Read More

You cannot deny the impact of cloud computing. Many organizations have begun to leverage the cloud for a variety of reasons as it offers innovative ways to solve problems, manage risks, optimize c...

Read More

“What is the best way to protect data in Office 365?” It’s a question we’re asked all the time. While turning on tools and enabling functionality can be simple, the real challenge is planning fo...

Read More

Business Email Compromise (BEC) fraud is a growing threat for companies of all sizes and all sectors. Last year, almost 89% of companies experienced at least one email fraud attack. It was the ...

Read More

Earlier this year, the FBI released its 2018 Internet Crime Complaint Center Report (IC3) which reports on the types of cybercrime being reported to the agency and trending threats individuals a...

Read More

Today, virtually all industries and governments are intrinsically and fundamentally dependent on critical infrastructure. But how do you define it? A critical infrastructure can be defined as any s...

Read More

Although organizations have accumulated more data than ever before, many businesses still struggle to understand what their data is telling them. Fraud analytics applies the latest technology and ...

Read More

We are in the middle of a tremendous period of change in how fraud investigations are conducted. This change is driven, in part, by the massive amount of data that has been collected and stored ov...

Read More

With access to sensitive customer data, the retail industry is a prime target for cyber-attacks.  In the past decade, the retail industry has undergone major shifts worldwide due to the rise of the...

Read More

The growing complexity and capacity of business’ systems are making it difficult for investigators to understand, follow, and detect fraud. As data grows exponentially and spreads outside the orga...

Read More

More than ever, healthcare has shifted to team-based care, increased specialization, and experienced an explosion of digital data alongside strict regulations for security and patient privacy. Con...

Read More

Many administrators find themselves responsible for more and more systems as companies grow. Sometimes this growth is unplanned and requires the admin to take on responsibility for systems and app...

Read More

It’s relatively common for people to prepare for when things go wrong. Many have first aid kits in the closet for the occasional injury. Some may budget for an emergency fund in case they lose the...

Read More

We’ve done a lot of cybersecurity work at BDO Digital. As you can imagine, we’ve just about seen it all. One thing we do see, unfortunately, is that most organizations don’t begin to seriously ...

Read More

In today’s world, it’s clear that managing security is a struggle for many organizations. With each passing minute, not only do the number of attacks increase, but the sophistication, scope, and a...

Read More

As our digital lives become increasingly enmeshed with our work lives, there is a concern for businesses to make sure that information is not released unintentionally via malicious means or otherw...

Read More

We live in a world where security incidents dominate headlines. The recent Facebook security breach , which exposed the accounts of 50 million users, is yet another example of how even the most h...

Read More

We live in a culture that expects near-immediate response from our technology, wherever and whenever we need it. Technology downtime not only impacts productivity and profits, but it can also dama...

Read More

Cybersecurity Ventures predicts that by 2022, there will be 6 billion internet users (75% of the world’s population) – and more than 7.5 billion internet users by 2030 (90% of the projected wo...

Read More

In our recent Tech Insights Survey, we found that the majority of midsize organizations have accepted the reality that they are a target for a cyberattack – it's no longer a matter of if, it's a m...

Read More

In today’s world, it’s clear that managing security is a struggle for many organizations. With each passing minute, not only do the number of attacks increase, but the sophistication, scope, and a...

Read More

Exploring Security and Productivity in Microsoft 365: Teams, Skype and Power BI It has been widely established that the most vulnerable point of security failure is end users. Countless studies h...

Read More

In part two of our Workforce Transformation blog series, we’ll look at the second “P” of successful digital workforce transformation – Protection . In an increasingly digital world, humans have ...

Read More

Last year was a bad year for cybersecurity. Remember the Equifax breach ? Wannacry ? And more phishing attacks to count? Breaches have gotten bigger, hackers have gotten smarter, and security te...

Read More

73% of cybersecurity breaches are financially motivated, according to the 2017 Verizon Data Breach Investigations Report. This means the attackers are after your organization’s data to sell on the...

Read More

In November 2017, the Global Cyber Alliance in partnership with IBM and Packet Clearing House launched a new service to help combat cybercrime which is free for personal and business use. It is a...

Read More

The PCI Data Security Standard (PCI DSS) has required multi-factor authentication (MFA) since its earliest versions. With the recent updates to PCI DSS v3.2 published in 2016, organizations are al...

Read More

On January 3rd, 2018, news was publicly disclosed about a pair of security vulnerabilities named “Meltdown” and “Spectre”. They are both related to hardware vulnerabilities in modern processors. ...

Read More

In my last blog, I highlighted the shortcomings of the three most common security assessments. Today, we’ll explore a way to overcome these challenges. At its most basic level, the job of any sec...

Read More

Windows Defender Advanced Threat Protection (Windows Defender ATP) is a security service focused on post-breach forensics and remediation on endpoints. ATP enables enterprise customers to detect, ...

Read More

A security vulnerability was published in October 2017 that could allow hard drives protected with Bitlocker to be unencrypted, among other risks. If you count on Bitlocker to protect sensitive in...

Read More

Microsoft’s Advanced Threat Protection (ATP) is a cloud-hosted add-on to Office 365 (Exchange Online) that helps prevent zero-day malware, Advanced Targeted Attacks and phishing attacks in your em...

Read More

A new ransomware outbreak has been identified bearing similarities to WannaCry from earlier this year. Dubbed Bad Rabbit , the ransomware appears to have simultaneously infected systems in Russ...

Read More

WPA2, the security protocol used to protect the vast majority of Wi-Fi connections, has been broken by Belgian researchers, highlighting the potential for millions of devices to be exposed to mali...

Read More

The framework of the Cyber Kill Chain was developed by Lockheed Martin Corporation in 2011. Since then, organizations of all sizes have been referencing this model to manage their information secu...

Read More

Despite the wide-scale adoption of the cloud, many well-established, highly regulated sectors have been slow to migrate to the cloud due to concerns about security. Understandably, businesses gene...

Read More

The threat of cybercrime continues to rise, as criminals adapt to new security measures and take advantage of changes in user’s online behavior. The rising threat of cyber crime was made all the m...

Read More

Despite rising security threats, we’re still seeing an alarmingly high number organizations sitting relatively still when it comes to protecting their IT systems against attacks. We hear things li...

Read More

When was the last time you did a backup on your databases? You may need to do this if you manage multiple SQL instances and are responsible for making sure backups happen for all databases. Backup...

Read More

Shadow IT refers to the practice of deploying IT systems and solutions outside of, and without the knowledge of, the IT department. As cloud applications mature, Shadow IT has grown exponentially....

Read More

Every IT environment is made up of complex and ever-changing infrastructure systems and applications that interact with and depend on each other to function. As applications continue to grow in co...

Read More

A web application firewall (WAF) recently became available as part of Azure’s Application Gateway Firewall offering. When migrating existing applications to Azure, WAF ensures web applications are...

Read More

To a large extent, U.S. businesses went unscathed from the first version of WannaCry that paralyzed 40 U.K. hospitals and other organizations across 150 countries, but the implications of WannaCry...

Read More

Friday saw the beginning of one of the largest global cyberattacks to date. The malicious software known as WannaCry quickly spread via users unknowingly clicking on an infected link, poorly confi...

Read More

You probably have heard by now, if you weren’t a victim yourself, of the phishing scam that went viral via Google Docs yesterday. Targeting Google’s estimated 1 billion users worldwide, the hack s...

Read More

In our last few blog articles, we discussed ways that Azure Information Protection (AIP) allowed data to be secured inside and outside the organization (read AIP - Manual and Automatic File Class...

Read More

In our last EMS blog post, we discussed how to protect data with Azure Information Protection (AIP). But once data is protected, how do you ensure that only the right people are accessing it?  Wha...

Read More

In the last blog of the EMS blog series, we talked about Microsoft Cloud App Security for monitoring and managing your cloud applications. Today, we're rounding out the features of Azure AD Premiu...

Read More

As we mentioned in the last blog about Single Sign On for Cloud Apps, the number of cloud-based applications is growing exponentially. As a result, it is almost a certainty many of your users are ...

Read More

As the mobile workplace becomes more and more common in the corporate environment, usernames and passwords are often not enough to protect an organization’s network. Just as we discussed in our "S...

Read More

In our last blog, we introduced the 5 products of Enterprise Mobility + Security.  Today, we'll dive deeper into the first product -- Azure Directory Premium -- by looking at one of its most commo...

Read More

Welcome to our blog series on Microsoft’s Enterprise Mobility + Security (previously the Enterprise Mobility Suite).  This suite of products (known as EMS) provides a number of features to enhance...

Read More

Knowing the difference between vulnerability assessment and penetration testing is critical when hiring an IT Security Management Firm to perform a security assessment. In this blog, we expl...

Read More

In an ever changing world where security has become more and more of a consideration in all aspects of technology, one area that we are asked about frequently at BDO Digital is email encryption. F...

Read More

Most people understand why one of the most important aspects of a technology solution is the need for security. Oddly enough, one area in particular that is neglected most often is the switching (...

Read More
Displaying 1-15 of 79
1 2 3 4 5
View 9
  • View 9
  • View 28
  • View 56
Relevance
  • Relevance
  • Most Recent
  • A-Z
  • Z-A