Microsoft Cloud security.

Unsure if your Office 365 (O365) or Azure deployment is safe?

Let our experts check.

We have a ton of experience checking and building secure cloud deployments.

Putting your data in the Microsoft cloud makes sense. Cloud systems are always kept up-to-date. And your data can be automatically backed up. That’s great!

But there are some new problems that raise concerns:

  • Is your data properly encrypted online?
  • Are your people logging on securely to the cloud (using strong authentication?)
  • How many administrators have you defined?
  • Are connections to remaining legacy systems (like local Active Directory) in order?

Our team has all the necessary tools at hand to run a complete check of your cloud deployment.

Furthermore, our experience in security governance allows us to link your cloud security setup to any security standard you may want to follow (ISO 27001, NIST, PCI DSS,…) and of course we check for GDPR compliance too.

After a thorough assessment, we can give you a roadmap with all the necessary actions to finish a secure deployment. And of course, we can make sure the necessary changes are handled properly.

Ask for our experts to contact you

0 + 4 = ?

,

Why the IT-OT Convergence is all about knowledge sharing

After attending the fifth Cyber and SCADA Security for Oil & Gas Industry conference, it became apparent lots of companies are having a hard time with the mingling of IT staff in the OT/ICS environments; the so-called IT-OT Convergence. My personal opinion is that the involvement of the IT people in OT environments is a…

, ,

Using ‘Embrace Cybersecurity’ to check on security progress

In a previous blog posts (Business and IT aligned with Cybersecurity and Baselining Cybersecurity), I introduced our ‘Embrace Cybersecurity’ (EC) model for gathering security requirements that can be used to create an information security policy. Using this method makes it easy to then also follow up on progress. We can do this by creating the…

, ,

Business and IT aligned with cybersecurity

The owner of information In today’s organisation, information is primarily managed and processed by IT. The IT department is very often also made responsible for securing the information in the systems that the business uses. Reports of recent cybersecurity incidents tell us this is definitely not right and recent legislations like the GDPR agree. A…