<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Virtuas</title>
	<atom:link href="https://virtuas.com/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://virtuas.com</link>
	<description>Houston IT Services - Top Rated - Public Benefit Corporation</description>
	<lastBuildDate>Mon, 06 Apr 2026 14:10:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://virtuas.com/wp-content/uploads/2026/03/Virtuas-Icon-Logomark-300x300-1-150x150.png</url>
	<title>Security &#8211; Virtuas</title>
	<link>https://virtuas.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Importance of Data Governance for Microsoft 365 Copilot</title>
		<link>https://virtuas.com/insights/digital-workplace/microsoft-365-copilot-data-governance/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Thu, 29 Aug 2024 19:03:26 +0000</pubDate>
				<category><![CDATA[Digital Workplace]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Businesses]]></category>
		<category><![CDATA[copilot]]></category>
		<category><![CDATA[Productivity]]></category>
		<category><![CDATA[Surface Laptop]]></category>
		<category><![CDATA[Surface Pro]]></category>
		<category><![CDATA[Workspaces]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1736</guid>

					<description><![CDATA[How to avoid the risks of exposing sensitive information with Copilot Microsoft 365 Copilot is a powerful tool that can help users write faster and better by providing suggestions and insights based on the context and content of their documents. Copilot uses artificial intelligence to learn from the data that users have access to, such [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">How to avoid the risks of exposing sensitive information with Copilot</h2>



<p>Microsoft 365 Copilot is a powerful tool that can help users write faster and better by providing suggestions and insights based on the context and content of their documents. Copilot uses artificial intelligence to learn from the data that users have access to, such as files, emails, chats, and web pages, and generates relevant and coherent texts that can improve productivity and creativity.</p>



<p>However, Copilot also poses some challenges and risks for businesses that lack appropriate governance for their data, especially when it comes to sensitive information. Without proper data classification, protection, and monitoring, Copilot can potentially expose confidential or regulated data to unauthorized users or leak it to external parties. This can result in legal, reputational, and financial damage, as well as loss of trust and compliance.</p>



<h2 class="wp-block-heading">What are sensitivity labels and why are they important?</h2>



<p>Sensitivity labels are a feature of Microsoft 365 that allow companies to classify and protect their data based on its level of sensitivity. Sensitivity labels can be applied to documents, emails, and other types of data, either manually by users or automatically by policies. Sensitivity labels can also enforce encryption, access restrictions, watermarks, and other protection actions on the data, regardless of where it is stored or shared.</p>



<p>Sensitivity labels are important for several reasons. First, they help organizations comply with data protection regulations, such as GDPR, HIPAA, or PCI DSS, by ensuring that sensitive data is handled appropriately and securely. Second, they help prevent data loss or leakage, by preventing unauthorized access, copying, or sharing of sensitive data. Third, they help maintain data quality and integrity, by preventing accidental or malicious modification or deletion of sensitive data.</p>



<p>By applying sensitivity labels to their data, companies can benefit from Microsoft 365 Copilot without compromising their data security or privacy. Copilot will respect the sensitivity labels and will not suggest or generate texts that contain sensitive information that the user is not authorized to access or share. Copilot will also not learn from or store sensitive data that is encrypted or protected by sensitivity labels. This way, organizations can leverage Copilot&#8217;s capabilities while minimizing the risks of data exposure or misuse.</p>



<h2 class="wp-block-heading">What are the risks of not having sensitivity labels applied before enabling Copilot?</h2>



<p>If companies do not apply sensitivity labels to their data before enabling Copilot, they may face several risks and challenges. Some of these are:</p>



<p><strong>Copilot may ingest and learn from sensitive data</strong> that is not protected by sensitivity labels, such as personal information, financial data, health records, trade secrets, or intellectual property. This may result in Copilot suggesting or generating texts that contain sensitive information that the user or the recipient is not authorized to access or share. For example, Copilot may suggest a customer&#8217;s name, address, or credit card number in an email, or a company&#8217;s confidential strategy or financial report in a document. This may violate data protection regulations, breach confidentiality agreements, or expose competitive advantages.</p>



<p><strong>Copilot may not respect the traditional SharePoint permissions</strong> that companies rely on to control access to their data. SharePoint permissions are based on the location of the data and the role of the user, and they do not apply to the content or the context of the data. Copilot, on the other hand, is based on the content and the context of the data. This may result in Copilot suggesting or generating texts that contain information that the user or the recipient is not supposed to see or know. For example, Copilot may suggest a project status, a budget, or a feedback item that is only meant for a specific team or manager, or a sensitive issue or problem that is only known to a few people.</p>



<p><strong>Copilot may enable users to access sensitive information</strong> that they do not have access to in SharePoint, through prompt engineering. Prompt engineering is the technique of crafting specific queries or prompts that can elicit specific responses from Copilot. For example, a user may ask Copilot to write a summary of a document, a list of key points, or a question-and-answer session. If Copilot has learned from sensitive data that is not protected by sensitivity labels, it may reveal that information in its responses, even if the user does not have access to the folder in SharePoint. This may allow users to bypass SharePoint permissions and access sensitive information that they are not supposed to see or know.</p>



<h2 class="wp-block-heading">How can Microsoft Purview and overall data governance help?</h2>



<p>Microsoft Purview is a unified data governance service that helps companies discover, catalog, map, and classify their data across Microsoft 365 and other sources. Purview can help organizations apply sensitivity labels and other data protection policies to their data, as well as monitor and audit their data usage and compliance.</p>



<p>Purview can help avoid the risks of not having sensitivity labels applied before enabling Copilot, by providing the following benefits:</p>



<p><strong>Purview can help discover and catalog data</strong> across Microsoft 365 and other sources, such as Azure, Power BI, SQL Server, or third-party cloud services. Purview can also help users understand the lineage, relationships, and quality of their data, as well as the business terms and definitions associated with their data. This can help identify and prioritize the data that needs to be classified and protected by sensitivity labels, as well as the data that can be safely used by Copilot.</p>



<p><strong>Purview can help map and classify data</strong> based on its level of sensitivity, using predefined or custom sensitivity labels. Purview can also help apply sensitivity labels and other data protection policies to their data, either manually or automatically, using rules, conditions, or machine learning. This can help ensure that data is consistently and accurately labeled and protected, regardless of where it is stored or shared, and that Copilot respects the sensitivity labels and does not expose or misuse sensitive data.</p>



<p><strong>Purview can help monitor and audit data</strong> usage and compliance, by providing insights and reports on how their data is accessed, shared, and protected across Microsoft 365 and other sources. Purview can also help detect and respond to data incidents, such as data breaches, leaks, or violations, by providing alerts and notifications, as well as remediation actions and recommendations. This can help maintain visibility and control over data and ensure that Copilot is used in a responsible and compliant manner.</p>



<p>Overall data governance is an essential prerequisite for implementing Microsoft 365 Copilot, as it can help maximize the benefits and minimize the risks of using Copilot. By applying sensitivity labels and other data protection policies to their data, companies can ensure that Copilot respects data security and privacy and does not suggest or generate texts that contain sensitive information that the user or the recipient is not authorized to access or share. By using Microsoft Purview and other data governance tools, organizations can discover, catalog, map, classify, monitor, and audit their data across Microsoft 365 and other sources, and ensure that their data is consistently and accurately labeled and protected.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Microsoft 365 Copilot is a powerful tool that can help write faster and better by providing suggestions and insights based on the context and content of company data. However, Copilot also poses some challenges and risks for businesses that lack appropriate governance for their data, especially when it comes to sensitive information. Without proper data classification, protection, and monitoring, Copilot can potentially expose confidential or regulated data to unauthorized users or leak it to external parties.</p>



<p>To avoid these risks, companies need to apply sensitivity labels and other data protection policies to their data before enabling Copilot. Sensitivity labels can help classify and protect data based on its level of sensitivity and ensure that Copilot respects the sensitivity labels and does not suggest or generate texts that contain sensitive information that the user or the recipient is not authorized to access or share. Companies also need to use Microsoft Purview and other data governance tools to discover, catalog, map, classify, monitor, and audit data across Microsoft 365 and other sources, and ensure that data is consistently and accurately labeled and protected.</p>



<p>By following these best practices, organizations can benefit from Microsoft 365 Copilot without compromising data security or privacy. Copilot can help improve productivity and creativity, while data governance can help maintain compliance and trust.</p>



<p>Should your business require assistance with integrating Copilot into your systems, please feel free to&nbsp;<a href="https://virtuas.com/contact/">contact us.</a>  </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguarding against AI-powered Cyber Threats</title>
		<link>https://virtuas.com/insights/news/defend-against-ai-cyberattacks/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Thu, 06 Jun 2024 22:15:50 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Business]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1683</guid>

					<description><![CDATA[At Virtuas, we strive to keep our clients updated on the latest AI developments. One thing all businesses should be aware of is the security risks associated with AI. While technology is advancing with AI, it is also causing cybersecurity attacks. For example, automated spear phishing campaigns are more prevalent than ever before, and it [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>At Virtuas, we strive to keep our clients updated on the latest AI developments. One thing all businesses should be aware of is the security risks associated with AI. While technology is advancing with AI, it is also causing cybersecurity attacks. For example, automated spear phishing campaigns are more prevalent than ever before, and it is crucial to be ahead of curve and learn how to defend against these attacks.</p>



<h2 class="wp-block-heading">Navigating the Intersection of AI and Cybersecurity: Risks and Opportunities</h2>



<p>The advent of artificial intelligence (AI) has brought about a paradigm shift in various sectors, including cybersecurity. While AI can significantly enhance threat detection and response, it also introduces new vulnerabilities and attack vectors. The potential risks and challenges of AI attacks stem from their sophistication and speed, which can outpace traditional security measures. AI-powered attacks can exploit data, manipulate algorithms, and even autonomously conduct operations that blend in with regular activity, making them particularly difficult to detect and mitigate.</p>



<h2 class="wp-block-heading">Examples of AI attacks include:</h2>



<ul class="wp-block-list">
<li>Prompt Injection</li>



<li>Evasion Attacks</li>



<li>Training Data Poisoning</li>



<li>Weaponized Models</li>



<li>Data Privacy Attacks</li>



<li>Model Denial of Service</li>



<li>Model Theft</li>
</ul>



<h2 class="wp-block-heading">Strengthening AI Security: Best Practices for Businesses</h2>



<p>Businesses must be vigilant and proactive in protecting themselves against these threats. Implementing defensive AI is crucial; it can analyze patterns and anomalies in data to identify potential threats in real-time. Additionally, businesses should ensure that their AI systems are transparent and have robust oversight mechanisms to prevent exploitation. Regular security audits and system assessments can help identify and address vulnerabilities. Employee training is also essential, as human error can often be the weakest link in security.</p>



<p>Moreover, businesses should adopt multi-factor authentication (MFA) to regulate access to AI-based tools and systems. Filtration and moderation techniques can prevent the dissemination of malicious content generated by AI-powered tools. It is also advisable to stay updated on the latest threats and to leverage &#8220;temperature flags&#8221; that can indicate suspicious activity. Building out in-depth defense measures, securing AI-based applications, and following AI application security best practices are all steps that can be taken to fortify a company&#8217;s defenses against AI attacks.</p>



<h2 class="wp-block-heading">The Ultimate Defense</h2>



<p>Virtuas employs a multi-layered approach to safeguard its clients’ networks against AI-driven cyber threats. At the forefront, Palo Alto firewalls serve as the initial line of defense. Renowned for their robustness and advanced threat detection capabilities, these firewalls effectively filter incoming and outgoing traffic, preventing unauthorized access and malicious activities.</p>



<p>In addition, Virtuas leverages Microsoft Defender for Business and Defender for Endpoint. These Endpoint Detection and Response (EDR) solutions provide real-time monitoring, threat intelligence, and incident response. By analyzing endpoint behavior, they swiftly identify and mitigate any suspicious activities, ensuring comprehensive protection for client devices.</p>



<p>Recognizing that email remains a prime vector for cyberattacks, Virtuas recommends Proofpoint as an essential layer of defense. This email security solution employs advanced threat detection algorithms, sandboxing, and URL rewriting to prevent phishing attempts, malware distribution, and other email-based threats. By combining these defenses, Virtuas fortifies its clients’ digital infrastructure, safeguarding critical data and maintaining business continuity.</p>



<p>Palo Alto firewalls, Microsoft Defender, and Proofpoint can leverage AI to be more effective in fighting against cyber-attacks.</p>



<p>To prevent human error, Virtuas has a proven track record of providing phishing awareness training to numerous clients. Our proactive and transparent approach involves close communication with client users. Whenever we identify practices that deviate from industry best practices, we promptly offer advice to ensure robust cybersecurity. Are you worried about AI attacks affecting your business? <a href="https://virtuas.com/contact/">Contact Us.</a></p>



<h2 class="wp-block-heading">Securing the AI Frontier</h2>



<p>While AI presents significant opportunities for advancement, it also necessitates an innovative approach to cybersecurity. Businesses must balance the benefits of AI with the risks it poses and develop comprehensive strategies to protect against AI-powered cyber threats. Utilizing Palo Alto&#8217;s firewalls, Microsoft&#8217;s Defender, and Proofpoint, are just a few ways businesses can protect themselves from these cyber-attacks. By leveraging AI for defense, ensuring transparency and oversight, conducting regular audits, training employees, and implementing robust security measures, businesses can mitigate the risks associated with AI attacks.</p>



<h2 class="wp-block-heading"></h2>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Strictly Enforce Location Policies with Continuous Access Evaluation</title>
		<link>https://virtuas.com/insights/security/continuous-access-evaluation/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Wed, 30 Aug 2023 20:09:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1519</guid>

					<description><![CDATA[Continuous Access Evaluation lets organizations secure cloud resources with location policies. It’s a new feature in preview. Without it, they may face threats.]]></description>
										<content:encoded><![CDATA[
<p>At Virtuas, we always look for ways to help our clients improve their security posture and protect their sensitive data. One of the challenges our clients face is preventing unauthorized access to cloud resources from stolen or compromised tokens. A solution to this challenge is a new feature of Microsoft Entra ID that is currently in public preview. Microsoft Entra ID enables organizations to enforce location policies strictly with Continuous Access Evaluation.</p>



<h2 class="wp-block-heading">What is Continuous Access Evaluation and Why do Organizations Need it?</h2>



<p>Continuous Access Evaluation is a mechanism that offers real-time evaluation of Conditional Access policies for certain apps, such as Exchange Online, SharePoint, Teams, and Microsoft Graph. Continuous Access Evaluation enables these apps to revoke tokens in near real-time in response to network change events noticed by the app, such as IP address changes, device state changes, or user risk changes.</p>



<p>This means that if an attacker steals a token from a legitimate user and tries to use it from a different location, the app will detect the location change and block the access, preventing data leakage or compromise.</p>



<p>However, Continuous Access Evaluation has a limitation: it only works for apps supporting it. For apps that don&#8217;t support Continuous Access Evaluation, such as legacy or third-party apps, the token will still be valid until it expires or is revoked by Azure AD. This creates a window of opportunity for attackers to exploit the token and access resources that are not protected by Continuous Access Evaluation. That&#8217;s where Strictly Enforce Location Policies comes in.</p>



<h2 class="wp-block-heading">What is Strictly Enforce Location Policies and How Does it Work?</h2>



<p>Strictly Enforce Location Policies is a new enforcement mode for Continuous Access Evaluation used in Conditional Access policies. This new mode provides protection for resources, immediately stopping access if the IP address detected by the resource provider isn&#8217;t allowed by Conditional Access policy.</p>



<p>This option is the highest security modality of Continuous Access Evaluation location enforcement and requires that administrators understand the routing of authentication and access requests in their network environment.</p>



<p>When organizations enable Strictly Enforce Location Policies, they must ensure that all IP addresses from which the users can access Microsoft Entra ID and resource providers are included in the IP-based named locations policy. Otherwise, a user might accidentally be blocked.</p>



<p>Organizations can use the Continuous Access EvaluationWorkbook or Sign-in logs to determine which IP addresses are seen by Continuous Access Evaluation resource providers and configure policies accordingly.</p>



<h2 class="wp-block-heading">How Can Organizations Benefit from Strictly Enforce Location Policies?</h2>



<p>By using Strictly Enforce Location Policies, organizations can achieve the following benefits:</p>



<ol class="wp-block-list">
<li>Reduce the risk of token theft and replay attacks by enforcing location policies at the resource level. This prevents the attacker from accessing sensitive data or performing malicious actions on behalf of the user. This also reduces the impact of token expiration or revocation, as the token will be invalid as soon as the user changes their location.</li>



<li> Enhance security posture by applying the principle of least privilege and granting access only from trusted locations. This means that organizations can limit the exposure of their cloud resources to only the locations that are necessary for their business operations. This minimizes the attack surface and reduces the chances of data breaches or unauthorized access. This also helps organizations comply with regulatory or contractual obligations that may require them to restrict data access based on location.</li>



<li>Simplify compliance requirements by ensuring that data is accessed only from authorized locations. This means that organizations can easily demonstrate that they have implemented adequate controls to protect their data from unauthorized access based on location. This can help them avoid fines, penalties, or reputational damage that may result from failing to comply with data protection laws or standards. This can also help them gain trust and confidence from their customers, partners, and stakeholders that their data is secure and well-managed.</li>
</ol>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Strictly Enforce Location Policies is a powerful feature that can help organizations protect their cloud resources from unauthorized access. By using this feature in combination with Continuous Access Evaluation, businesses can achieve a high level of security and compliance.</p>



<p>However, this feature also requires careful planning and testing before deployment. Organizations must ensure that all authentication traffic towards Azure AD and access traffic to resource providers are from dedicated egress IPs that are known and allowed by policies.</p>



<p>Organizations in need any assistance or guidance on how to implement this feature can <a href="https://virtuas.com/contact/">contact</a> Virtuas.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>6 Steps to Protect IT from a Cyberattack</title>
		<link>https://virtuas.com/insights/security/protect-against-a-cyberattack/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Fri, 07 Apr 2023 15:57:35 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1327</guid>

					<description><![CDATA[Do you know the importance of defending against a cyberattack?  Here are six tips that we implement with our clients for defending against a cyberattack.]]></description>
										<content:encoded><![CDATA[<p>Defending against attacks is more important than ever as organizations use more data and attackers become more sophisticated. Organizations can drastically increase their chances of preventing attacks by enforcing a proper cybersecurity plan. Without a comprehensive approach, organizations are vulnerable to risking their data, revenue, and credibility. Here are six concepts we at Virtuas implement with our clients to defend against cyberattacks and protect data.</p>
<h2>Segment Networks to Prevent Lateral Movements</h2>
<p>Serious threats can arise when malware has unlimited network access, leading to lateral movements. A lateral movement occurs when an attacker moves from one system to another in search of desired data. Segmenting networks is essential for enhanced security because network managers can better control traffic and limit access to sensitive data. Along with enhancing security, segmenting networks improves network performance and management.</p>
<h2>Preserve Backups in Isolation</h2>
<p>Having a separate set of credentials for backups adds a layer of security, reducing the risk of unauthorized access to the backup data. When organizations do not preserve backups in isolation attackers have a better chance of accessing backups after an attack on the primary system. Attackers can then manipulate or delete the backup data, rendering it useless for recovery.</p>
<h2>Implementing Multifactor Authentication <strong> </strong></h2>
<p>Implementing a Multifactor Authentication (MFA) process requires each user to have unique criteria to access a desired account. Enabling MFA decreases the chance of an account becoming compromised or impersonated. MFA has various notification types including text codes, email codes, and number matching. The recommended MFA notification type is number matching due to its increased security protection.</p>
<p>Number matching provides a unique number that gives additional security by ensuring that hackers cannot access a desired account through tactics such as MFA bombing or MFA fatigue attacks. To learn more about number matching MFA <a href="https://virtuas.com/insights/news/new-mfa-number-matching-requirement/">click here.</a></p>
<h2>Perform Backups Regularly with Immutability <strong> </strong></h2>
<p>Performing backups regularly ensure that data remains unaltered in the case of a cyberattack and protects from software bugs and human errors. Backups with immutability are recommended because once these backups are created, the data contained within them cannot be modified, deleted, or altered in any way. Creating a 3-2-1 backup strategy is recommended to increase protection measures and ensure data remains safe. The 3-2-1 strategy requires having three copies of data, on two different media types, with one copy offsite (preferably air-gapped) all of which increase protection.</p>
<h2>Test and Update Recovery Plans<strong> </strong></h2>
<p>It is critical to perform frequent tests to identify Recovery Point Objectives (RPOs) and Recovery Time Actuals (RTAs) and to ensure high-priority data and applications are defined. Testing will allow IT staff to verify that recovery procedures and technologies are working as expected. Following testing, implement changes or updates to cybersecurity plans to ensure organizational data is protected.</p>
<h2>Additional Steps</h2>
<p>At Virtuas, we implement these six concepts with our clients to increase protection against cybersecurity threats. Additional measures to improve protection include: understanding data thoroughly, installing antivirus protection, ensuring up-to-date patches, and conducting employee security training.</p>
<p>Does your organization need help to protect against a cyberattack? <a href="https://virtuas.com/contact/">Contact</a> us at Virtuas for all your cybersecurity needs.</p>
<p><!-- /wp:post-content --></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New MFA Number Matching Requirement</title>
		<link>https://virtuas.com/insights/news/new-mfa-number-matching-requirement/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Tue, 28 Mar 2023 13:31:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1296</guid>

					<description><![CDATA[Microsoft is enforcing number matching for their multifactor authentication app starting on May 8th, 2023.]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>Multifactor Authentication (MFA) adds a layer of security protection by requiring users to provide information beyond a password when they try to log into their account. Microsoft utilizes and recommends number matching notifications for its MFA services, an upgrade from traditional two-factor notifications. Users are sent a unique number they need to type into the Microsoft Authenticator app before they access their account. </p>



<p>Other forms of MFA include text-message and email codes, but they are overall less secure.&nbsp;Text-message and email code notifications lack the uniqueness that number matching provides which puts the users accounts at risk. The unique number provides additional security by ensuring that hackers cannot gain access to a desired account through tactics such as MFA bombing and MFA fatigue attacks. Due to the increased security risk, Microsoft will soon enforce number matching notifications for all Microsoft Authenticator users.</p>



<h2 class="wp-block-heading">What is Happening? &nbsp;</h2>



<p>Until now, the Microsoft Authenticator app would send a simple push notification and allowed for admin control and enforcement for what notification type was being used. Users could choose if they wanted to use number matching or a different type of MFA notification. Starting on May 8, 2023, Microsoft is removing the admin control and enforcing the number match experience for all Microsoft Authenticator push notifications. </p>



<p>Number matching is the most secure form of MFA notifications and organizations are faced with an increased risk of a cyberattack when using other forms. Wanting to decrease the risk of attacks, Microsoft is taking matters into their own hands and enforcing the most secure form of MFA notifications for all users of their authenticator app. &nbsp;&nbsp;</p>



<h2 class="wp-block-heading">Why is Number Matching for MFA Being Enforced?&nbsp;</h2>



<p>While all MFA notification types have provided additional areas of protection for organizations accounts, attackers have found ways to override the system. By using a technique such as MFA bombing and MFA fatigue attacks, attackers are able to bypass traditional security methods. </p>



<p>MFA bombing which leads to MFA fatigue attacks, allows attackers to send large numbers of authentication requests to an online account. With the help of automated tools and sometimes stolen credentials data, attackers are able to send out thousands of notification request. The hope is the user will get so overwhelmed by the bombardment of MFA notifications that the user selects “allow” to make the notifications stop. Once the user allows access into their account, hackers can gain access to the desired system often installing ransomware and holding data hostage in exchange for money. &nbsp;</p>



<p>MFA bombing and MFA fatigue attacks are preventable when number matching as the notification type. The unique number provided with number matching increases protection for users. Other forms of MFA notifications lack the uniqueness which puts individual accounts and organizational data at an increased risk. The number provided is almost impossible to duplicate which ensures that organizations are protected from these attacks. Unlike with text and email codes, attackers can no longer send out thousands of automated requests that bombard users in an attempt to access a desired account. </p>



<p>As cybersecurity risks increase, organizations must adapt and become more vigilant when protecting their data. Microsoft understands the risk from not enabling number matching, which is why they are enforcing it starting on May 8, 2023. &nbsp;</p>



<p> &nbsp;</p>



<h2 class="wp-block-heading">What Can Your Organization Do?&nbsp;</h2>



<p>Although organizations have until May 8th to enable MFA number matching, we have already been rolling out number matching for our clients. We recommend working with our team to schedule the transition before it&#8217;s enforced on May 8th to ensure your organization has increased protection against cybersecurity attacks.</p>



<p><a href="https://virtuas.com/contact/" target="_blank" rel="noreferrer noopener">Contact</a> us at Virtuas for assistance enabling number-matching notifications and for all your cybersecurity needs.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apache Log4j Vulnerability and Our Response</title>
		<link>https://virtuas.com/insights/news/response-to-apache-log4j-vulnerability/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Mon, 13 Dec 2021 23:51:46 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1193</guid>

					<description><![CDATA[Log4j, a popular java open-source logging library, is vulnerable to a serious exploit.]]></description>
										<content:encoded><![CDATA[
<p>On December 9<sup>th</sup>, 2021, it was revealed that there is a remote code execution vulnerability in Apache log4j, being actively exploited by attackers, prompting the US Cybersecurity and Infrastructure Security Agency to issue a statement about this software bug on December 11<sup>th</sup>, 2021.</p>



<h2 class="wp-block-heading">What Is Log4j?</h2>



<p>Log4j is a popular java open-source logging library used in countless applications across the world. Its lightweight framework allows developers to create a log of everything an application has done for the purpose of debugging.</p>



<h2 class="wp-block-heading">What is the exploit?</h2>



<p>Log4j allows logged messages to contain format strings that reference outside information through the Java Naming and Directory Interface (JNDI). If someone sends the library a message in the form of a special string of characters, it enables attackers to perform remote code execution, which means they can run any code and access all data on the affected machine.</p>



<h2 class="wp-block-heading">Who is affected?</h2>



<p>The full scope of this exploit has not been fully uncovered, but the impact is wide and far reaching. New information is being actively reported, and you can view an active list of affected vendors and their responses <a href="https://vrt.to/6qq" target="_blank" rel="noreferrer noopener">here</a>.</p>



<h2 class="wp-block-heading">Virtuas Response</h2>



<p>Our managed services clients have properly configured firewalls with threat protection that prevents this exploit from outside attackers. Virtuas has assisted clients to identify any affected systems and promptly applied the necessary updates to improve the security posture.</p>



<p>If you are not currently a customer and need assistance with this threat or any other, please <a href="/contact">contact us</a>.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Virtuas Response to Kaseya Ransomware Attack</title>
		<link>https://virtuas.com/insights/news/virtuas-response-to-kaseya-ransomware-attack/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Tue, 06 Jul 2021 19:57:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1128</guid>

					<description><![CDATA[Over the Fourth of July weekend, it was revealed that Kaseya&#8217;s VSA software was used to launch the largest ransomware attack on record, affecting over a million systems. Kaseya&#8217;s VSA product is a suite of software tools that assist IT companies and IT departments manage and monitor computer systems remotely. A vulnerability in the software [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Over the Fourth of July weekend, it was revealed that Kaseya&#8217;s VSA software was used to launch the largest ransomware attack on record, affecting over a million systems. Kaseya&#8217;s VSA product is a suite of software tools that assist IT companies and IT departments manage and monitor computer systems remotely. A vulnerability in the software allowed attackers to compromise companies using Kaseya&#8217;s software.</p>



<p><strong>Virtuas does not use any Kaseya products</strong>, so we are not affected. The Kaseya VSA software is relatively popular, so we urge caution over the next few months as the data harvested may be used in phishing campaigns against the suppliers and customers of those impacted by this attack. </p>



<p>If you know a company that was affected and requires assistance, please <a href="/contact/?contact-reason=Kaseya%20Ransomware%20Assistance#contact-message" target="_blank" rel="noreferrer noopener">contact us</a>. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Strengthen Your Company&#8217;s Security with Secure Score</title>
		<link>https://virtuas.com/insights/cloud/secure-score-video/</link>
		
		<dc:creator><![CDATA[Virtuas]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 20:16:58 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Beginner]]></category>
		<category><![CDATA[How To]]></category>
		<category><![CDATA[Video]]></category>
		<guid isPermaLink="false">https://virtuas.com/?p=1084</guid>

					<description><![CDATA[Use Microsoft Secure Score to check and improve your company's security. Watch the video to see how Secure Score works.]]></description>
										<content:encoded><![CDATA[
[embedyt] https://www.youtube.com/watch?v=2H_09a0etGM[/embedyt]



<p>Ransomware and security threats are prevalent, and they are getting more sophisticated. How protected is your company from malicious threats? Use Microsoft Secure Score to check your company&#8217;s protection and use the recommendations to improve your security. </p>



<p>Virtuas has many tutorials on Microsoft 365 applications. Watch our <a href="http://vrt.to/playlist" class="rank-math-link" target="_blank" rel="noopener">playlist </a> and <a href="http://vrt.to/youtube" class="rank-math-link" target="_blank" rel="noopener">subscribe to our channel</a> to see more tutorials!</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
