Category: IT Security

Strengthening Security: MFA Required for Microsoft Admin Access

Starting on or after October 15, 2024, Microsoft will implement a significant security enhancement by mandating multi-factor authentication (MFA) for admins accessing the Microsoft Azure portal, Microsoft Entra admin center, and Microsoft Intune admin center. This requirement will also extend to any services accessed through the Intune admin center, such as Windows 365 Cloud PC. The introduction of MFA is a proactive measure to bolster security, providing an extra layer of protection against unauthorized access. Microsoft strongly recommends enabling MFA as soon as possible to take full advantage of its security benefits. For detailed guidance, admins are encouraged to review the document “Planning for mandatory multifactor authentication for Azure and admin portals.”

This change will have a direct impact on organizations by necessitating the activation of MFA for their tenants. Admins will need to ensure that MFA is enabled to maintain access to the Azure portal, Microsoft Entra admin center, and Intune admin center post-implementation. The transition to mandatory MFA underscores Microsoft’s commitment to enhancing security protocols and safeguarding sensitive information.

To prepare for this change, organizations must set up MFA before the October 15, 2024 deadline. This proactive step will ensure that admins can seamlessly access the necessary portals without interruption. In cases where setting up MFA before the deadline is not feasible, organizations have the option to apply for a postponement of the enforcement date. However, it is crucial to note that if MFA is not configured before the enforcement begins, admins will be prompted to register for MFA upon their next sign-in to the Azure portal, Microsoft Entra admin center, or Intune admin center.

The introduction of mandatory MFA is a strategic move by Microsoft to enhance the security framework of its admin portals. By requiring an additional authentication factor, Microsoft aims to mitigate the risks associated with single-factor authentication, such as password breaches and unauthorized access. This initiative reflects a broader industry trend towards strengthening security measures in response to evolving cyber threats.

Organizations are advised to communicate this upcoming change to their admin teams and ensure that all relevant documentation is updated accordingly (see Planning for mandatory multifactor authentication for Azure and admin portals). By doing so, they can facilitate a smooth transition to the new security requirements and minimize any potential disruptions. The implementation of MFA is not just a compliance measure but a critical step towards safeguarding organizational data and maintaining the integrity of admin operations.

Microsoft’s decision to mandate multi-factor authentication for admin access to key portals is a pivotal enhancement in its security strategy. This change, effective from October 15, 2024, will require organizations to enable MFA to ensure uninterrupted access for their admins. By taking proactive steps to implement MFA, organizations can significantly bolster their security posture and protect against unauthorized access. Admins are encouraged to familiarize themselves with the new requirements and prepare accordingly to leverage the full benefits of this enhanced security measure.

By mandating MFA, Microsoft is taking a significant step towards bolstering the security of its admin portals. Organizations should prepare for this change to ensure seamless access and enhanced protection for their admin operations.

Permanent link to this article: https://www.robertborges.us/2024/08/cloud-computing/strengthening-security-mfa-required-for-microsoft-admin-access/

Embrace the Power of MFA to Protect Your Accounts

Our lives have become intricately intertwined with the digital realm in a world dominated by technology. From personal communications to financial transactions, our reliance on online platforms has grown exponentially. However, as we immerse ourselves in this digital revolution, we must also acknowledge the vulnerabilities that come with it. This is where Multi-Factor Authentication (MFA) swoops in, like a magical key, to unlock the digital fortress and empower us on our journey toward a secure and seamless digital experience.

Unleashing the Digital Revolution: Embrace the MFA Magic!

The power of MFA lies in its ability to fortify our online presence by adding additional layers of security. Gone are the days when a simple password was sufficient to keep our digital lives safe. MFA combines multiple authentication factors, such as passwords, biometrics, and one-time codes, to ensure that only authorized individuals gain access to our sensitive information. By embracing MFA, we protect ourselves and contribute to the collective effort of building a more secure digital ecosystem.

Beyond the realm of personal security, MFA opens the doors to a multitude of opportunities. It enables us to explore the vast landscape of the digital world without fear of falling victim to cyber threats. With MFA, we can confidently venture into e-commerce, online banking, and remote working, knowing that our digital fortress is impenetrable. By embracing this powerful tool, we empower ourselves to embrace the infinite possibilities of the digital age.

Blast Open the Gates: Let MFA Empower Your Digital Journey!

By embracing MFA, we unleash the true potential of the digital revolution. We liberate ourselves from the constraints of traditional security measures and step into a world where innovation and creativity thrive. MFA not only protects our digital identities but also provides a solid foundation for developing groundbreaking technologies. As we secure our digital lives, we can confidently explore emerging fields such as artificial intelligence, blockchain, and the Internet of Things.

Moreover, MFA bridges the gap between user experience and security. While traditional security measures often come at the cost of convenience, MFA strikes a harmonious balance between the two. With its diverse authentication factors, MFA ensures that our digital journey remains seamless and hassle-free, allowing us to focus on what truly matters – our aspirations and ambitions in the digital realm.

In a world where our lives are increasingly intertwined with the digital realm, it is essential to embrace the power of Multi-Factor Authentication. When we enhance the security of our online presence by adding extra layers of protection, we not only safeguard ourselves but also help to establish a more secure digital environment. With MFA, we can confidently embark on our digital journey, exploring new horizons and embracing the boundless possibilities of the digital revolution. So let us unlock the digital fortress, empower ourselves, and embrace the magic of MFA!

How to Enable MFA in Windows

Implementing MFA on Windows can be done in a few steps. First, you need to enable MFA in the account settings of the online service you are using. Major services like Microsoft Accounts or Azure Active Directory provide the option to enable MFA. After enabling, you will be prompted to verify your identity using a secondary method, such as a phone call, text message, or an authenticator app.

Once you’ve enabled MFA on your account, the setup on your Windows device will mostly be automatic. After entering your password, you’ll be prompted for your secondary authentication factor. Depending on the setup, this could be a code from your authenticator app, a fingerprint scan, or a prompt on your mobile device. Your device will remember your MFA setup and use it for future logins.

How to Enable MFA on an iPhone

To implement MFA on an iPhone, you first need to head to the ‘Settings’ app. Then, tap on your name at the top of the screen to access Apple ID settings. Scroll down to ‘Password & Security’ and tap it. Here, you can turn on ‘Two-Factor Authentication’.

After turning on two-factor authentication, you’ll be asked to enter your trusted phone number. This number will be used to send verification codes when you sign in on a new device or browser. Once you’ve verified your phone number, two-factor authentication will be turned on. You’ll now receive a verification code every time you sign into your Apple ID on a new device.

How to implement MFA on Android

Enabling MFA on an Android device is a straightforward process. If you’re using Google services, start by visiting the ‘Google Account’ section in your phone’s settings. Under the ‘Security’ tab, find the ‘2-Step Verification’ option and tap on it.

After tapping ‘2-Step Verification’, you’ll be prompted to enter your password. Once your password is entered, you’ll be directed to a screen where you can choose how you’d like to receive your second form of authentication: through a Google prompt, a text, or a call to your backup phone, or by using an authenticator app. Choose the option that suits you best, follow the prompted steps, and voila! You’ve enabled MFA on your Android device.

Permanent link to this article: https://www.robertborges.us/2023/07/cloud-computing/unlocking-the-digital-fortress-embrace-the-power-of-mfa/

Bring Your Own Device: Making BYOD Work in Your Company

Back in 2012, I wrote a post Bring Your Own Device (BYOD): Is BYOD Bad for Your Company? based on the commonly available technology at the time.  Now that nearly 6 years have passed, I’d say it is time for an update. 

BYOD (Bring Your Own Device) is the allowance of employee-owned equipment onto company systems.  Typically, this involves employees using consumer computing devices (such as iPads or Surface tablets) to get work done, either in the office, at home, or on the road. Many of these devices are not designed to “get work done,” but instead to consume content (e.g., checking email, reading news, social media, etc.). These devices are not managed and may lack even the most basic security features enabled. Here is the problem: If your BYOD strategy is not planned correctly, this can spell disaster for any corporate network.  How is your company protecting its data on devices out of its control?  What happens when an employee leaves the company or a device is accidentally left behind at a coffee shop?

Continue reading

Permanent link to this article: https://www.robertborges.us/2019/01/it-security/bring-your-own-device-making-byod-work-in-your-company/

Bring Your Own Device (BYOD): Is BYOD Bad for Your Company?

Microsoft Surface RT Tablet

Microsoft Surface RT Tablet

Until recently when we thought of computing devices, we usually thought of PCs and laptops. Today, with tablets and smart phones selling in the millions on opening weekend, we have a very different picture of what a computing device is.

If you’re not familiar with it, BYOD (Bring Your Own Device) is the idea of using a consumer computing device (such as an iPad or Surface RT tablet) to get work done, either in the office, at home, or on the road. Most of these devices were not designed to “get work done”, but instead to consume content (ex: checking email, reading news websites/apps, etc.). These devices are not managed, and may not have even the most basic security features enabled. This can spell disaster for any corporate network. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/11/cloud-computing/bring-your-own-device-byod-is-byod-bad-for-your-company/

Preventing Pop-ups and fake security

We have become so dependent on this electronic world we have built.  With such critical information as medical records and banking, it is imperative that we protect ourselves from the many cyber threats lurking at every turn.  

Common variants of these cyber threats are pop-ups and fake security applications (ie. fake anti-virus, fake anti-spyware, and fake anti-malware). The best way to stop these threats is to prevent them from ever taking hold of your system in the first place. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/10/it-security/preventing-pop-ups-and-fake-security/

People Keep Getting Spam Emails from My Email Address. What Do You Suggest?

There are actually several ways to send email as another person, making it look like they actually sent the email. Most of these methods don’t actually require access to the users Email mailbox. This is what we refer to as spoofing. If you’ve ever received an Email from yourself, then you know what I’m talking about. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/07/it-security/people-keep-getting-spam-emails-from-my-email-address-what-do-you-suggest/

Recovering from a Spyware or Virus Infection

In my previous post (Preventing Spyware or Virus Infections) I explained how to help protect yourself from virus and spyware infections. If you still do contract a spyware or virus infection, there are a few things you can do to clean up your PC or laptop. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/05/it-security/recovering-from-a-spyware-or-virus-infection/

Preventing Spyware or Virus Infections

The best way to fight malware or viruses is to prevent them from infecting your computer in the first place. You can help keep your computer protected by: Continue reading

Permanent link to this article: https://www.robertborges.us/2012/04/it-security/preventing-spyware-or-virus-infections/

How to Securely Dispose of Your Old Hard Drives

The hard drive in your PC or laptop holds all of your data and applications. It is kind of like long-term memory for a computer. Just like in the movies, even when you erase that data, remnants are left behind making it often possible to recover the data long after it has been deleted. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/04/it-security/how-to-securely-dispose-of-your-old-hard-drives/

Is your home Wi-Fi secure?

Wi-FiAnswer: Probably not. Most home networks are not secure to begin with. To add wireless A/B/G/N on top of that, you’re really asking for trouble. Fear not, for here are a few things you can do to lock down your environment, and keep out snooping eyes. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/04/it-security/is-your-home-wi-fi-secure/

IT Security is Like an Onion – IT Security Basics – Part 3: End-User Security

In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/

IT Security is Like an Onion – IT Security Basics – Part 2: Server Security

In Part 1 I discussed securing your network perimeter. But as I said in the beginning, IT security is like an onion. Let’s take a look at the next layer of that onion… securing your server environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-2-server-security/

IT Security is Like an Onion – IT Security Basics – Part 1: Perimeter Security

In this day and age, every organization should have a good firewall at the perimeter of their network. There are firewalls all over the spectrum and many good options for businesses small and large. For small businesses there are great firewall units designed for the SMB market from companies like Cisco, Sonicwall, and Astaro. For medium to enterprise size organizations, or if you just want that extra capacity, there are some really fantastic devices from Cisco, Fortinet, and Astaro that should give you the functionality and flexibility you need. Regardless of the manufacturer, there are key components which are critical to your network’s security. Continue reading

Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-1-perimeter-security/

IT Security is Like an Onion: The Basics of IT Security Blog Series

In many ways, IT security is like an onion comprised of many layers. As you work through each layer new layers are revealed. This blog series is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Long gone are the days where antivirus software alone is enough security! This is a 3 part series outlining Perimeter Security, Server Security, and End-User (client) Security.

Part 1, Perimeter Security will be available on Monday March 19, 2012.

Part 2, Server Security will be available the following Monday March 26, 2012.

Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-the-basics-of-it-security-blog-series/

What is FOPE (Forefront Online Protection for Exchange)?

Forefront Online Protection for Exchange (FOPE) is one of the unsung heroes of the Microsoft Exchange world.

If you’ve been running Microsoft Exchange for your organization, chances are you’ve heard of Forefront Protection for Exchange. This is a software which sits on servers in the datacenter and monitors all incoming and outgoing email to protect against spam and malware threats (among other threats). One of the biggest concerns I hear from administrators, when considering email protection, is not feeling comfortable enough with their security experience to be responsible for something so critical as Forefront Protection for Exchange.

Continue reading

Permanent link to this article: https://www.robertborges.us/2012/03/it-security/what-is-fope-forefront-online-protection-for-exchange/