Office 365 vs. G Suite: The dilemma of choosing between the behemoths and the benefits of Office 365

Office 365 vs. G Suite: The dilemma of choosing between the behemoths and the benefits of Office 365

Those who remember Microsoft’s Business Productivity Online Suite (BPOS) understand why there was such an interest in the release of Google Apps vs Office 365. Since their initial release, Google Apps has bloomed into G Suite and BPOS has evolved into Office 365. Both of which are capable of hosting a cloud based collaboration solution for companies of any size.…

Read More

Secure Against NetBIOS Name Service (NBT-NS) Poisoning Attacks with Group Policy

What is the NetBIOS Name Service, and Why is it Vulnerable to Poisoning Attacks? When reaching other systems on the network, we tend to think of DNS being the primary way that a Windows computer can translate a name to an IP address. However, there are several other methods available. One of the available name resolution services is the NetBIOS over TCP/IP Name Service (NBT-NS).…

Read More
More Data, More Problems… Leveraging the Azure Import/Export Tool (Part 1 – Requirements)

More Data, More Problems… Leveraging the Azure Import/Export Tool (Part 1 – Requirements)

In today’s market businesses are likely familiar with the enterprise services provided in Azure and have already started planning a cloud transition.  As Azure expands its core offering and more business transition to a cloud platform, the question becomes, “how does an organization move large amounts of data to the cloud, specifically to Azure? …

Read More
Unpleasant Discoveries: Cybersecurity Vulnerabilities Uncovered

Unpleasant Discoveries: Cybersecurity Vulnerabilities Uncovered

It’s every acquirer’s worst nightmare: you’ve spent countless hours vetting an M&A target, and after the deal goes through, you catch something. West Monroe Partners surveyed top-level corporate executives and private equity partners about their companies’ practices in order to better understand the state of cybersecurity diligence for M&A. The results provide a window into the trends...

Read More
The PCI DSS Cares about Disaster Recovery & Backups

The PCI DSS Cares about Disaster Recovery & Backups

In a separate post, we discussed Common Misconceptions around the Payment Card Industry Data Security Standard (PCI DSS). Building off those thoughts, this post will discuss an often-overlooked consideration when navigating the PCI DSS – disaster recovery (DR) and backups. West Monroe Partners has extensive experience conducting security due diligences for M&A transactions and helping...

Read More
Backing Up To the Cloud From the Cloud

Backing Up To the Cloud From the Cloud

In our last post, “Managing Administrative Access to an Azure-based Cardholder Data Environment,” we outlined ways to secure administrative workflows by using various Azure technologies. We’ll resume with part eight of the Azure Secure Cloud Migration blog series, covering considerations for backing up VMs in Azure and all the associated restrictions and caveats.…

Read More
Integrating Data Security into Your Transaction Due Diligence Process

Integrating Data Security into Your Transaction Due Diligence Process

It’s hard to read the news these days without seeing another headline about a data breach. As companies rely increasingly on technology, the importance of securing customer information and intellectual property has increased exponentially—as has the cost of failing to keep data secure. Concerns about cybersecurity have become especially acute when it comes to M&A transactions.…

Read More
Reduce PCI DSS Costs by Reducing Scope

Reduce PCI DSS Costs by Reducing Scope

In a recent post, we discussed some scenarios involving Service Providers and their integration into Payment Card Industry Data Security Standard (PCI DSS) compliance. Click here for more of our recent series of blog posts on PCI DSS-related topics for more information. Defining the cardholder data environment (CDE) is a key step toward PCI DSS compliance and has become somewhat of a pain...

Read More
Addressing the Magic Bullet – Part 1

Addressing the Magic Bullet – Part 1

As a part of your business operations, do you accept credit card payments? Have you looked at the PCI DSS and thought ‘that’s a lot of stuff to do’? Have you outsourced PCI DSS responsibility to a third party payment processor in order to be PCI DSS compliant? Do you own the Merchant ID that payments are processed under?…

Read More
Controlling Inbound and Outbound Traffic Flow in an Azure-based Cardholder Data Environment

Controlling Inbound and Outbound Traffic Flow in an Azure-based Cardholder Data Environment

In our previous post, we examined the trade-offs when implementing a Public Key Infrastructure (PKI) in Azure using Active Directory Certificate Services. For an overview of the blog series and a list of the topics being covered, see the introductory post, “Preparing to Migrate to a Secure Cloud”. This week, we will continue the Azure Secure Cloud Migration blog series by...

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons