Monday, October 30, 2023

Microsoft recognized as a Leader in the Forrester Wave: Data Security Platforms, Q1 2023

Organizations need to protect sensitive data including intellectual property, trade secrets, customer data and personally identifiable information from both insiders and external cyber attackers. A complex regulatory environment makes the protection of sensitive data and prevention of data exfiltration all the more urgent. To help customers navigate complex data landscapes, Microsoft focuses on delivering secure and intelligent, user-centric solutions to improve visibility and mitigate risk. We are excited to share that Forrester listed Microsoft as a Leader in its 2023 WaveTM for Data Security Platforms. Read this blog for a summary of the report which provides a detailed overview of vendor offerings, strategies and market presence.


Howard University doubles security score and saves $1 million annually

Howard University, a leading historically Black college in Washington, DC, doubled its security score in less than a year after expanding its use of Microsoft Azure. After suffering a ransomware attack in 2021, the university sought to strengthen its security with Microsoft solutions. In just three weeks, Howard restored all core IT services, increased efficiency, boosted security and saved money, Read the full story to learn what they accomplished and how.


Azure Virtual Desktop Watermarking Support

Watermarking printed documents and PDFs is a common practice to keep them from being copied. Now you can also watermark digital screen views and screen shots with the new Microsoft Azure Virtual Desktop Watermarking feature. Watermarking is an optional protection feature to Screen Capture in Virtual Desktop. Read how to access support for the Watermarking feature in this article.


Wednesday, October 25, 2023

Tech Tip Tuesday - This one simple thing is still the best way to protect yourself


A weak password is still the #1 way hackers break into your network. In fact, 81% of the total number of breaches last year utilized weak or stolen passwords!

Here’s what a GOOD password should contain:

·       A minimum of eight characters

·       Uppercase and lowercase letters

·       At least one number and one symbol (#, for example)

·       No complete words, like “PaSsWord123#.” While this meets the requirements, a hacker’s brute-force software will crack that in seconds.

·       Never reuse a password for multiple accounts (like making your Facebook and LinkedIn passwords the same).

If you have questions about cyber security or some other IT-related issues for your business? Go to to book a quick, 10-minute call.


#cybersecurity #passwordvault  #passwordsecurity #networksecurity #ITSupport #ITServices

Monday, October 23, 2023

Building a Holistic Insider Risk Management Program

The risk landscape has changed dramatically with the growth of the digital landscape. The amount of data captured, copied and consumed is expected to rise to more than 180 zettabytes in the near future. Traditional ways of identifying and mitigating risks simply don't work. Historically, organizations have focused on external threats; however, risks from within can be just as prevalent and harmful. These trends make it imperative to think about insider risk as a core part of your data protection strategy with a holistic approach including the right people, processes, training and tools. The Microsoft Security report, "Building a Holistic Insider Risk Management Program: 5 elements that help companies have stronger data protection and security while protecting user trust," provides insight. Download the report for an inside look at how Microsoft shifted from focusing solely on risk management to thinking about building value and security culture and benefits it gained as a result.

View: Building a Holistic Insider Risk Management Program

Microsoft a Leader in the 2023 Gartner Magic Quadrant for Desktop as a Service

The desktop as a service (DaaS) market continues to grow, as does the need by organizations for flexible and secure remote access. In this free copy of Gartner's inaugural Magic Quadrant for DaaS, you'll read about the key DaaS solutions and providers - and learn why Gartner rated Microsoft a "Leader."


Eurowings enhances security, will reduce operating costs by 50+ percent with Azure Virtual Desktop

Eurowings, Lufthansa Group's low-cost airline, serves more than 40 million customers at 100 destinations around the world. When the company's on-premises server farms, which provide application access and security to thousands of external and contract employees, needed upgrading, Eurowings decided to ditch its on-prem servers and embrace the cloud with Microsoft Azure Virtual Desktop. Tim Thomer, Enterprise Architect at Eurowings explains:. "We wanted a cloud VDI solution capable of running modern authentication, and which could match our existing infrastructure in terms of security and reliability. That's how we found Microsoft Azure Virtual Desktop." Read the Eurowings story of cloud adoption in this Microsoft article.


Tuesday, October 17, 2023

Cyber Security Tip: How to spot a phishing e-mail!

 Protect Yourself from Phishing Scams: Spotting the Fakes

Imagine receiving an email that seems completely legitimate, potentially from a trusted website you use regularly. However, hidden beneath the surface lies a sinister ploy to deceive you into revealing sensitive login information or downloading a harmful virus. These deceptive emails, known as phishing emails, can be incredibly convincing, making it crucial to know how to distinguish them from authentic messages.

Some common disguises employed by phishing emails include appearing to be PDF attachments, fake tracking numbers from renowned couriers like UPS or FedEx, official bank letters, notifications from social media platforms like Facebook, or bank alerts. The danger lies in the fact that they are meticulously crafted to mimic the appearance of genuine emails, making them difficult to identify.

So, how can you safeguard yourself against these fraudulent emails? Look out for these telltale signs that can help you spot phishing attempts before falling victim.

If you have any questions about cybersecurity or other IT-related issues for your business, visit to book a quick, 10-minute call. 

For a free security assessment, schedule an appointment at

#cyber security #email security #network hacked #IT consultants #IT Support #Phishing protection #Network Security #Utah Network Security #Salt Lake city Network Security

Monday, October 16, 2023

NHS Supply Chain boosts productivity with Microsoft Surface devices

Discover how the NHS transformed patient care with Surface devices. Get the inspiring story of how it overcame digital challenges and improved healthcare outcomes. Learn how Microsoft's technology empowered healthcare providers to enhance collaboration, streamline workflows, and deliver efficient care. Read the blog and take a deep dive into this remarkable customer story to gain insights into the power of technology in healthcare. Unlock the secrets behind the NHS's success and get in touch to discuss how Fidelitech Solutions Inc. can help you apply lessons learned to revolutionize your own organization.


Introducing Surface Laptops

The Microsoft Surface Laptop 5 offers multitasking speed powered by 12th Gen Intel® Core™ processors, up to 17 hours of battery life, Windows 11 and a vibrant touchscreen. Watch this video to be inspired by how sleek and beautiful it is. Better yet, it comes in your choice of size and color!

Announcing Public Preview of Personal Desktop Autoscale on Azure Virtual Desktop

Good news! You can now preview Microsoft's Personal Desktop Autoscale, which is Azure Virtual Desktop's native scaling solution that automatically starts session host virtual machines according to schedule. With Personal Desktop Autoscale, you can save costs by shutting down idle session hosts while ensuring session hosts can be started by users when needed. Find out more in this article.


Tuesday, October 10, 2023

Protecting Your Network from Ransomware: Don’t Ignore This Critical Vulnerability!


Did you know that there's a common vulnerability that many organizations overlook? It's a dangerous oversight that can give hackers free reign to spread ransomware throughout your entire network. Sounds scary, right?

 But don't worry, we've got a solution for you. By implementing a simple yet effective measure, you can stop these attackers in their tracks.

 Introducing separate local admin passwords for each computer you support. This is a small, but a crucial step that prevents hackers from gaining access to just one computer and then seamlessly moving laterally through your entire network, wreaking havoc along the way.

 Don't let your network become the next victim. Take action now and safeguard your organization from the devastating consequences of ransomware attacks. We've got your back with the tools and automation that make managing random generated local admin passwords easy.

If you have any questions about cybersecurity or other IT-related issues for your business, visit to book a quick, 10-minute call.

For a free security assessment, schedule an appointment at

Monday, October 9, 2023

4 Breakthrough Ideas for Compliance and Data Security

Are you struggling to increase visibility and control over data without slowing it down? An integrated compliance and security platform can help. The Microsoft Security eBook, "4 Breakthrough Ideas for Compliance and Data Security," explores critical data protection challenges and how a modern, unified platform can address them. Discover how to consolidate compliance and security capabilities into a more efficient, manageable and scalable solution that empowers employees to be productive virtually anywhere without unnecessary risk. Download the eBook now and take your first step in reducing risk while increasing efficiency.

View: 4 Breakthrough Ideas for Compliance and Data Security

2023 Gartner Magic Quadrant for Desktop as a Service - Free Offer

You need to know the pros and cons of the leading desktop-as-a-service (DaaS) solutions before you buy. Read the full inaugural Gartner Magic Quadrant for DaaS vendors, including digital workplace leaders like Microsoft Virtual Desktop. Get the free report. 👉


Introducing Adaptive Protection in Microsoft Purview—People-centric data protection for a multiplatform world

Protecting data has never been more important, yet it's becoming increasingly complex. Microsoft Purview helps simplify data protection and enables a people-centric approach to security. The blog post, "Introducing Adaptive Protection in Purview—People-centric data protection for a multiplatform world," introduces Adaptive Protection, a machine learning-power feature in Purview that automates security responses and adapts to new threats in real-time. Read the blog to discover how Purview can help your organization protect sensitive data across multiple platforms.


​​Centro Hospitalar builds up resistance to threats, analyzes 48 million logs a day with Microsoft Security solutions​

When Centro Hospitalar de Trás-os-Montes e Alto Douro needed a way to protect sensitive, highly confidential patient data and applications in its hybrid environment, it chose Microsoft Security solutions. Get the story for lessons learned on the hospital system's future-forward strategy based on a dynamic, cloud-based security approach that stays on top of threats and positions the provider for cloud migration. Learn what the provider gains by having a centralized view of security events with Microsoft Sentinel, increasing frontline defense with Azure Automation and Microsoft Defender for Cloud. Read the full story on the hospital's experience selecting and implementing Microsoft Security solutions.


Tuesday, October 3, 2023

Tech Tip Tuesday - Protecting Your Business from Ransomware - The Critical Aspect That Many Organizations Ignore!

 Are you doing everything right to protect your business from cyber threats? 

From implementing top-notch Endpoint Detection to monitoring your systems with a security operations center, you've covered all the bases. Or so you thought.

The truth is, many organizations fall victim to ransomware because they neglect a CRITICAL aspect of cybersecurity: physical security. While they do a great job protecting computer and notebook devices, they fail to secure their server and network rooms, often shared with other resources.

But why does physical security matter when it comes to ransomware? The answer is simple: someone can simply walk into your office, plug in a USB or network device, and infect your servers or network resources. They might impersonate a maintenance crew member, gaining access without anyone suspecting a thing.

That's why a comprehensive security plan is a must. It should not only address cyber threats but also physical security. Here are the 5 critical elements your physical security program should include:

Proper guest and visitor program: Log and monitor all guests and visitors, and if possible, supervise them while on your premises.

Reliable Gatekeepers: Have skilled personnel standing guard to prevent unwanted visitors from accessing secure areas and disturbing key employees and decision makers.

Secure server and network environments: Keep your equipment in a dedicated, locked, and monitored location whenever possible. Use secure doors and access cards to control access.

Limited access to secure locations: Make your secure areas hard to find and restrict entry to a select few. Continuously monitor these areas and have multiple layers of security.

Protect against tampering: Just like with end point devices, prevent USB devices from auto executing. Disable unused network ports and limit communication to necessary devices only.

Want to learn more about cybersecurity or discuss IT-related issues for your business? Schedule a quick, 10-minute call at 

Ensure your business is protected by scheduling a free assessment at

#cyber security #physical security #IT consultants #IT Support #Access Controls #Video Security #Guest Registration #Salt Lake City Network Security

Monday, October 2, 2023

Microsoft Digital Defense Report

Cybersecurity professionals need to keep up to date on the latest cyber-threat trends. This report from Microsoft analysts covers the threat landscape from IoT and infrastructure threats to disinformation campaigns, ransomware, and guidelines for thwarting these complex new threats. Each chapter provides the key lessons learned and insights based on Microsoft's unique vantage point. The trillions of signals that Microsoft analyzes from its worldwide ecosystem of products and services reveal the ferocity, scope, and scale of digital threats across the globe. You and your security team can read this comprehensive report on threats and Microsoft technologies that identify and block billions of phishing attempts, identity thefts, and other cyber-threats to Microsoft customers.

View: Microsoft Digital Defense Report

NTT Communications adds insider risk management to enhance data security with Microsoft Purview

When NTT Communications Corporation (NTT) sought to streamline the management of massive amounts of data spread across multiple systems and locations, it turned to Microsoft. A real success story, the company achieved its goal with the help of Microsoft Purview, a powerful data management tool. Discover how Microsoft Purview helped NTT significantly reduce operational costs and improve decision-making. Get the story to learn from NTT's experience. Get in touch to learn from one of our experts how Microsoft Purview can help streamline your data management process and improve business outcomes.


Azure Virtual Desktop Watermarking Support

Need help learning to use the new Microsoft Azure Virtual Desktop Watermarking feature? We have it here! Watermarking is an optional protection feature to Screen Capture in Virtual Desktop that acts as a deterrent for data leakage. This watermarking capability was first introduced in Feb 2023 via Public Preview of Windows Desktop clients. With General Availability, we're introducing support for Azure Virtual Desktop web client. Read how to access Watermarking support in this article.