Welcome to the levacloud blog. You will find a selection of content focused around Microsoft 365, Zero Trust Security and more. We like to create content that we believe our customers and the community will find useful as they try and navigate the ever evolving threat landscape that we live in today.
Underneath our blog you will see links to other blogs that we have chosen to feature.
Do you use multiple clouds in your business? Chances are, the answer is yes. The next question is how are you securing your sensitive business
More accolades for Microsoft data security solutions! Microsoft Purview Information Protection gets “Outstanding in Functionality” in the KuppingerCole Market Compass for Secure Collaboration. Plus, it’s
Healthcare institutions face an ever-present challenge: preserving the integrity and confidentiality of patient data. This task is becoming even more critical as threats evolve beyond
Discovering the Power of Microsoft Defender Vulnerability Management: Included in E5 and A5 Microsoft 365 Licensing
Microsoft Defender Vulnerability Management is a fantastic tool that offers all-encompassing solution to identify, assess, remediate, and track vulnerabilities across your organization’s most critical assets.
As the cybersecurity landscape continues to evolve, the need for robust, secure, and efficient VPN solutions has become more critical. Today, we delve into Microsoft’s
As cyber threats continue to grow in sophistication, organizations must remain vigilant in adopting advanced security solutions. Azure Active Directory (Azure AD) offers a substantial
A Security Architect Reacts vlog and podcast with Gareth Young, Founder and Chief Architect of Levacloud LLC, reviewing the Microsoft Security Blog “A Clearer lens
Virtual Machines Should be Part of Your 5 Year Growth PlaN Virtual Machines (VM): A virtual machine is a computer file, typically called an image, that
Hybrid cloud requires a new approach for security, with your infrastructure being spread out there is a need for increased visibility and control.
Protect Your Data Within Microsoft 365 With many organizations performing rapid cloud migrations to meet remote work requirements, there is a growing concern within the cybersecurity community that organizations
In legacy security models, the primary objective was to protect corporate applications and data by creating a security perimeter that could only be traversed via a corporate device with a VPN. As consumer
A small selection of blogs with quality content that we would like to share:
The Microsoft security blog is a great resource to stay up-to-date on both Microsoft Security and Compliance product update, as well as thought leadership on how to tack security and compliance challenges within your organization, as well as information about threat actors that Microsoft’s team of security researchers have discovered and developed mitigation techniques for.
Microsoft Detection and Response Team (DART) blog series is focused on the latest attack methods as well as cybersecurity best practices derived from our investigations and engagements, helping our customers respond to compromises and become cyber-resilient.
The CISA is a US govenrment agency responsible for Cybersecurity and Infrastructure, their blog is a great way to get a vendor neutral perspective on current events within the cybersecurity community that have significance at the national level.
If you have a blog, or an article, video or podcast that you would like us to feature then please reach out via email. If you are interested in collaborating on some content feel free to reach out also, we are open to new ideas especially if the content is going to benefit others.
ISC2 is the governing body for gold standard cybersecurity certifications such as the CISSP. This blog is a great way to stay up-to-date on current events, especially if you are studying for a cybersecurity certification