Printer Security

Are your printers safe from a cyber attack?
Midyear Cyber Checkup

Take a moment to check off some important steps to keeping your systems safe and secure. Lasco is here to help if you have any questions or concerns!
Strengthening Security

Implementing security controls is a critical part of doing business in today’s digital landscape.
What the heck are all these cyber attacks, anyway?

Bad actors have so many ways to attack your data, it’s hard to keep track! Sometimes, you need a partner to help!
[08/07/2025] – Quarter 3 Lasco Roundtable
Mark your calendars for Lasco’s 3rd Quarter Virtual Roundtable!
July is Ransomware Awareness Month

July is Ransomware Awareness Month. Lasco can help protect your sensitive information from data “kidnappers.”
E5 Security for Microsoft 365 Business Premium Users

E5 Security for MS 365 Business Premium Users Did you know that Microsoft has now enabled its E5 Security for all MS 365 Business Premium customers, offering protection for identities, endpoints, and data? As we continue to respond to current cyber threats, Microsoft E5 Security offers advanced features to keep your systems safe. Defender for Office 365 Plan 2 Microsoft Defender for Office 365 offers seamless integration into MS 365. There are two plans, but we are focusing on Plan 2. The key features of Defender for Office 365 Plan 2 include: Threat Trackers/Explorers -Threat Trackers are queries that you create and save in Threat Explorer. You use these queries to discover cybersecurity threats automatically, with real time reporting tools to help I.T. investigate and respond to threats Teams Message Quarantine/Entity Panel – Admins can view, release, and delete quarantined messages in Teams for users. In addition, the entity panel includes data about suspicious or malicious chats, groups, or channels. Compromised User Detection – When a user account is compromised, atypical or anomalous behaviors occur. Defender for Office 365 can detect such anomalies in email patterns and collaboration activity within Office 365. When this happens, alerts are triggered, and the threat mitigation process begins. Attack Simulations – Attack simulation training in the Microsoft Defender portal runs realistic attack scenarios for your organization. These simulated attacks can help you identify vulnerable users before a real attack impacts your bottom line. Campaign Views – The Campaign feature identifies and categorizes coordinated phishing and malware email attacks. Microsoft’s categorization of email attacks into discrete campaigns helps you to: Efficiently investigate and respond to email attacks, better understand the scope of the email attack that’s targeting your organization, and lets you see the overall picture of an email attack faster and more completely than any human can. Automated Investigation and Response (AIR) – AIR enables your I.T. team to operate more efficiently and effectively. AIR includes automated investigations of well-known threats and provides recommended remediation actions. This would allow for automated responses to specific cyber events. Entra Plan 2 Entra Plan 2 offers enhanced identity and access controls. The features include: Access Reviews – Access reviews in Microsoft Entra ID, part of Microsoft Entra, enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignments for SharePoint and other 365 resources. User access can be reviewed regularly to make sure only authorized people have continued access. Entitlement Management (Basic) – Entitlement management is an identity governance feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration. Entra ID Protection – During each sign-in, ID Protection runs all real-time sign-in detections, generating a sign-in session risk level that indicates how likely the sign-in is compromised. Based on this risk level, policies are applied to protect the user and the organization. MFA Registration Policy – Microsoft helps you manage the deployment of multifactor authentication (MFA) by configuring the Microsoft Entra ID Protection policy to require MFA registration regardless of the modern authentication app you’re signing in to. Privileged Identity Management (PIM) – PIM is a service in Microsoft Entra ID that enables you to manage, control, and monitor access to important resources in your organization. These include resources in Microsoft Entra ID, Azure, and other Microsoft Online Services, such as Microsoft 365 or Microsoft Intune. Risk Based Conditional Access – Multiple conditions can be combined to create fine-grained and specific Conditional Access policies. For example, when users access a sensitive application, an administrator might factor multiple conditions into their access decisions, such as: Sign-in risk information from ID Protection, Network location, or Device information. App Governance To understand the potential risks and stop these types of attacks, you need to gain clear visibility into your organization’s app compliance posture. You need to be able to quickly identify when a 365 app exhibits anomalous behaviors and respond when these behaviors present risks to your environment, data, and users. Defender for Cloud Apps Software as a Service (SaaS) apps are ubiquitous across hybrid work environments. Protecting SaaS apps and the important data they store is a big challenge. The rise in app usage, combined with employees accessing company resources outside of the corporate perimeter, has also introduced new attack vectors to consider. Defender for Identity Microsoft Defender for Identity is a cloud-based security solution that helps secure your identity monitoring across your organization. Defender for Identity is fully integrated with Microsoft Defender XDR, and leverages signals from both on-premises Active Directory and cloud identities to help you better identify, detect, and investigate advanced threats directed at your organization. Safe Documents Safe Documents is a premium feature that uses the cloud back end of Microsoft Defender for Endpoint to scan opened Office documents in Protected View or Application Guard for Office. All-in-all, Microsoft is offering bulked up security features that will enhance your security and offer a more robust defense against modern day cyber attacks. Need some help navigating Microsoft 365 E5 Security? Please call Andrew or Dustin at 906-228-9770 or 800-800-6197, or email sales@lascoinc.com.
[10/2/2025] – 2025 Lasco/MBA Cyber Symposium

Mark your calendars for our 2025 Cyber Symposium!
[02/14/2025] – LASCO Quarter 1 Cyber Roundtable

It’s the first Lasco Virtual Roundtable of 2025!
Lasco 4th Quarter Cybersecurity Round Table

Lasco’s 4th Quarter Virtual Cybersecurity Roundtable was held on Monday, October 28.