How to set up Azure AD to spot risky users
![]()
You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.
![]()
You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.

Credit to Author: Lucas Mearian| Date: Tue, 23 Jul 2019 10:46:00 -0700
Utah County is the latest government entity to pilot a mobile voting application based on blockchain to allow military absentee voters and their family members living overseas to vote in an upcoming municipal primary election.
The county, which has more than a half million residents, is the third in the U.S. to partner with Tusk Philanthropies on a national effort to expand mobile voting. The pilot is a collaboration between the Utah County Elections Division, Tusk Philanthropies, the National Cybersecurity Center and Boston-based voting app developer Voatz.

Credit to Author: Gregg Keizer| Date: Tue, 23 Jul 2019 03:00:00 -0700
Mozilla plans bake its Lockwise password manager into Firefox 70, the upgrade now set to launch Oct. 22.
At the same time, the browser will also be more tightly integrated with Firefox Monitor, which will provide warnings to users when their saved passwords have been revealed by a data hack.
According to Firefox bug reports and project documentation, Lockwise will automatically record username-and-password pairs, generate complex passwords on demand, identify victimized accounts and instruct users to change any passwords that have leaked.

Credit to Author: Peter Wayner| Date: Tue, 23 Jul 2019 03:00:00 -0700
Everyone in the enterprise loves the web browser when it’s delivering news, email, documentation, and sales leads. With the shift to web apps, it’s arguably the most important installed software on any corporate desktop. But the internet is filled with people who aren’t nice — sometimes even dangerous — and the same browser can also bring viruses, rootkits, and worse. Even if the browser sits on a little-used desktop in a dusty corner with no access to sensitive information, an attacker can use the seemingly unimportant machine as a stepping stone.
Keeping your users’ browsers secure is essential. The browser companies work hard to block the attackers by sealing the back doors, side doors, and cracks in between, but that isn’t always enough. Some useful features have dark sides, and enterprises can increase security dramatically by shutting down or tightly limiting access to these options.
(Insider Story)
Read more
Credit to Author: Matthew Finnegan| Date: Mon, 22 Jul 2019 09:50:00 -0700
Slack has overhauled its desktop software, adding offline access and tweaking the software for faster load times.
Recent efforts to improve the desktop app were highlighted at Slack Frontiers last year and the coming update – which the company says will launch 33% faster than before – will be available to users “over the next few weeks.”
Calls made to team mates via the app should be a speedier too, up to 10 times quicker, Slack said. “That could mean the difference between showing up to a meeting on time or not,” the company said in a blog post Monday. “These moments saved can quickly add up, giving you more time to focus on the tasks at hand.”

Credit to Author: Jonny Evans| Date: Thu, 18 Jul 2019 07:54:00 -0700
Like liberty for all, privacy demands vigilance, and that’s why Apple users who care about those things are moving to DuckDuckGo for search.
Privacy is under attack.
It doesn’t take much effort to prove this truth. At time of writing, recent news is full of creeping privacy erosion:
And then there’s Duck Duck Go.

Credit to Author: Sharky| Date: Mon, 15 Jul 2019 03:00:00 -0700
This government agency has cashiers’ stations for handling transactions with the public, and the treasurer’s office decides it needs new software to run those stations, according to a pilot fish in IT.
And there’s going to be one sign-on and password for all the stations, brag the higher-ups.
Bad idea, protest all the IT programmers and system administrators. For one thing, having a single user sign-on to the system will prevent tracking who is completing each transaction. They cite security, accountability and separation of duties, but their protests fall on deaf ears.
The vendor rep shows up one day, and he and the treasurer do a presentation for an audience that includes IT managers. The two sound excited, and a touch proud, when they tell everyone that the cashiers will sign on with the user ID “Cash.” They don’t share the top-secret password, though; that’s just for the cashiers to know.

Credit to Author: Jonny Evans| Date: Mon, 15 Jul 2019 09:00:00 -0700
If you travel frequently and use an iPhone or iPad, then you simply must familiarize yourself with these two tips – they’ll make it much easier to secure your device and its contents when you are on the move.
I’ve become very used to using Face ID. It’s seamless.
On the iPhone, I like that I can pay for groceries with a look and find it much easier to use in the dark than the Home button.
My iPad experience is similar, but I do get annoyed sometimes that I must raise the tablet slightly to get the face angle right – this isn’t always as intuitive as I would like.
All the same, given Apple’s claim that there is a 1 in 50,000 chance that someone else’s fingerprint will unlock your iPhone and a 1 in 1,000,000 chance that it will be unlocked by another person’s face, I’ll always opt for the highly secure choice.

The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.

Credit to Author: Matthew Finnegan| Date: Thu, 11 Jul 2019 11:51:00 -0700
Zoom released a patch this week to fix a security flaw in the Mac version of its desktop video chat app that could allow hackers to take control of a user’s webcam.
The vulnerability was discovered by security researcher Jonathan Leitschuh, who published information about it in a blog post Monday. The flaw potentially affected 750,000 companies and approximately 4 million individuals using Zoom, Leitschuh said.
Zoom said it’s seen “no indication” any users were affected. But concerns about the flaw and how it works raised questions about whether other similar apps could be equally vulnerable.