Our Reference Architecture for a Secured, Cloud Scalable Remote Work Solution​​​

​​The rmsource Professional and Managed Services teams have been working with our customers for quite some time to implement cloud/hybrid-cloud architectures. With the current COVID-19 pandemic, we thought it would be helpful to share our Best Practice Reference Architecture that we use when engaging with a new customer. ​rmsource has developed this unique set of…

A Proactive Guide to Threat Hunting

Reactive security practices will only get you so far. rmsource will be the first to tell you that a strong prevention (not detection) strategy is the best foundation for any cyber security practice. In order to stand a fighting chance against today’s threat actors and the staggering volume of attacks, dynamic prevention must be incorporated…

Leverage Cloud Scalability for Remote Work Solutions​​

​Like you, many IT leaders are working to scale and secure remote work technology, policies, and procedures quickly. With a sudden move to full-time work from home for many businesses, most are evaluating the impact on productivity rates, collaboration, governance, and data security. Gaps in infrastructure capability and technologies bring challenges to internal, BYOD and B2B collaboration,…

Keys to protect your organization from cybersecurity attacks

Recently, Mark Outlaw, our CEO, and I participated on a panel for Check Point on the topic of cybersecurity threats and protections. While sharing insights with the group of IT leaders and infosec experts, we were able to raise some key reminders for protecting your organization — no matter the size or sector.   The most important…

​Microsoft Extends Enhanced Anti-Spoofing Protection to all Exchange Online Organizations

​Microsoft recently announced the extension of enhanced anti-spoofing capabilities free of charge to all Exchange Online Protection (EOP) organizations. This comes as we’re seeing a rise in email spoofing, a tactic used in phishing and spam campaigns. These emails are especially threatening as the messages appear to come from a trusted source. A link in…

Issue in Microsoft Security ​​​and Quality Rollup Update

​The recent release of .NET security patches to address CVE-2018-8421 is causing SharePoint workflows to stop working. Our SharePoint and network teams have successfully remedied the issue using the following fixes. After installing, patch KB4457916/4457035 or Microsoft KB4457920 rollup, we’re seeing SharePoint 2010 and 2013 server workflows to fail on start. We have successfully applied this Microsoft…

​Expected Release: DDoS Protection for Microsoft Azure Government Cloud Virtual Networks

For those on the Azure Government Cloud, we’re expecting to see an announcement from Microsoft in the next 60 days (or so) regarding the release of the Azure Distributed Denial of Service (DDoS) built-in protections.  Back in May, the general availability of DDoS for the Azure Cloud was released – offering a no cost basic plan that includes always-on traffic monitoring,…

​​Microsoft Announces General Availability of Azure DDoS Protection for Virtual Networks​

​While Distributed Denial of Service (DDoS) attacks are not new, they are one of the top availability and security concerns for companies considering a transformation to the cloud. ​ We’re seeing increases of type, scale, and frequency of occurrence as they are relatively easy and cheap to launch and often are motivated by extortion or hacktivism….

ALERT: Microsoft O365 Zero-Day Vulnerability​

A Microsoft O365 zero-day vulnerability has been reported by SCMagazine – and it’s being exploited across organizations of all sizes. Known as BaseStriker, the vulnerability is being used to lure users into Phishing attacks by bypassing built-in Office365 security protection. This allows the delivery of emails with known malware and phishing links to users. Delivery of malicious…

The C-Suite’s Responsibility in the New Era of Data Protection ​

​In the era of data breeches and information misuse, corporations across the world are being held accountable by stakeholders, customers and regulators to implement responsible privacy practices. This includes building and managing a security infrastructure as well as a plan for responding after an attack. According to the Check Point 2018 Security Report, 59 percent of companies…