<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Uncategorized Archives | Fortress SRM</title>
	<atom:link href="https://fortresssrm.com/category/uncategorized/feed/" rel="self" type="application/rss+xml" />
	<link>https://fortresssrm.com/category/uncategorized/</link>
	<description>Full-Spectrum Cybersecurity Protection</description>
	<lastBuildDate>Mon, 24 Nov 2025 21:13:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fortresssrm.com/wp-content/uploads/2021/05/cropped-FORT_Favicon-32x32.png</url>
	<title>Uncategorized Archives | Fortress SRM</title>
	<link>https://fortresssrm.com/category/uncategorized/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</title>
		<link>https://fortresssrm.com/oops-azure-did-it-again-5-risks-you-cant-ignore/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 16:41:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1797</guid>

					<description><![CDATA[<p>Written by: Donovan Crowley, Fortress SRM Director of Security Strategy Cloud environments aren’t just that “data center in the sky” anymore. They have become the backbone of modern enterprise IT. And ...</p>
<p>The post <a href="https://fortresssrm.com/oops-azure-did-it-again-5-risks-you-cant-ignore/">Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-post-date"><time datetime="2025-11-24T11:41:54-05:00">November 24, 2025</time></div>


<p><strong>Written by:</strong> Donovan Crowley, Fortress SRM Director of Security Strategy</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Cloud environments aren’t just that “data center in the sky” anymore. They have become the backbone of modern enterprise IT. And with hybrid and multi-cloud setups becoming the norm, Microsoft Azure is often at the center, powering it all.&nbsp;</p>



<p>But here’s the catch: with great flexibility comes great complexity… and where there’s complexity, there’s risk.&nbsp;</p>



<p>Azure’s power lies in its configurability, but that same flexibility makes misconfigurations easy to create and hard to spot. In fact, misconfigurations remain one of the leading causes of cloud breaches today, far more common than flashy exploits or headline-grabbing vulnerabilities.&nbsp;</p>



<p>Across our assessments and incident response cases, we see the same pattern: a small configuration slip, seemingly harmless, quietly escalates into serious exposure. And often, it happens without generating a single alert.&nbsp;</p>



<p>Some of the most overlooked risks we see again and again include:&nbsp;</p>



<ul class="wp-block-list">
<li>Overly permissive access rules that expose private workloads.&nbsp;</li>



<li>Local or legacy accounts bypassing MFA or Conditional Access.&nbsp;</li>



<li>Dormant identities and unused resources creating governance blind spots.&nbsp;</li>



<li>Misconfigured or missing logs that hinder threat detection.&nbsp;</li>



<li>Persistent admin privileges without PIM or just-in-time controls.&nbsp;</li>
</ul>



<p>Alone, these issues might not look like much. But in a fast-moving cloud environment, they stack up. And attackers love that hidden surface, auditors find it fast, and defenders usually spot it too late.&nbsp;</p>



<p>In this post, we’ll break down the top five Azure misconfigurations we see in the wild, why even experienced teams miss them, and how a focused Cloud Security Posture Management (CSPM) assessment can help you fix them quickly.&nbsp;</p>



<h2 class="wp-block-heading">Top 5 Azure Misconfigurations Putting You At Risk</h2>



<p>Azure makes it easy to move fast. You can deploy an entire workload in minutes, integrate it, and scale instantly. But that speed also means you can misconfigure it just as quickly.&nbsp;</p>



<p>Cloud environments never sit still. New resources spin up, identity assignments change, and hidden dependencies. As a result, the same core misconfigurations show up in almost every assessment we run, whether the organization is a small startup or a Fortune 100 enterprise.&nbsp;</p>



<p>Here are the top five issues you cannot afford to ignore.&nbsp;&nbsp;</p>



<h3 class="wp-block-heading">1. NSGs and RBAC Gone Wild: The Danger of Overly Permissive Permissions</h3>



<p><em>Too much access + too many privileges = your biggest Azure attack surface.&nbsp;&nbsp;</em></p>



<h4 class="wp-block-heading"><strong>What to Watch For (Common Symptoms)</strong></h4>



<ul class="wp-block-list">
<li>Open inbound Network Security Group (NSG) rules that allow traffic from 0.0.0.0/0, especially for RDP (port 3389) and SSH (port 22).&nbsp;</li>



<li>Excessive RBAC role assignments, where users or groups are given broad roles (e.g., Owner or Contributor) where specific, granular functional roles should be used (e.g., Reader, Virtual Machine Contributor, etc.).&nbsp;</li>



<li>“Temporary” or convenience-driven configuration access that never gets removed.</li>
</ul>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Exposed ports are top targets for brute-force and credential-stuffing attacks. Overprivileged accounts turn a minor breach into a major one. Regulatory frameworks like CIS, ISO, and NIST flag this as high-right.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Do any NSGs allow unrestricted inbound access?</strong>&nbsp;<br>2.) <strong>Do you have more than a handful of Owner/Contributor assignments?</strong>&nbsp;<br>3.) <strong>Are administrative ports directly exposed to the internet?</strong>&nbsp;</p>



<h4 class="wp-block-heading">Recommended Fixes</h4>



<p><strong>NSG Hardening</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Restrict inbound access to known IP ranges only. Use IP whitelisting for administrative protocols.</li>



<li>Remove public exposure entirely where possible and use Azure Bastion for secure admin access.&nbsp;</li>



<li>Use Azure site-to-site or point-to-point VPN to your work site or static remote sites instead of public access for resource management.&nbsp;</li>



<li>Enforce network hygiene and compliance with Azure Policy, including:&nbsp;<br>&#8211; <em>Deny Public Inbound Ports</em>&nbsp;<br>&#8211; <em>Deny Internet Facing NSG Rules</em>&nbsp;</li>
</ul>



<p><strong>RBAC Hardening</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Adopt a least-privilege roles only model.</li>



<li>Favor granular roles such as:&nbsp;<br>&#8211; Virtual Machine Contributor&nbsp;<br>&#8211; Storage Blob Data Reader&nbsp;<br>&#8211; Key Vault Reader&nbsp;</li>



<li>Audit role assignments for overprivilege regularly. Example:<br><code>az role assignment list --all --query "[?</code><br><code>roleDefinitionName=='Owner'].[principalName,scope]"</code></li>



<li>Schedule recurring RBAC and NSG reviews with resource owners and identity teams.</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Automate the Safety Net</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>To scale risk detection and remediation:&nbsp;</p>



<ul class="wp-block-list">
<li>Use Azure Defender for Cloud and your SIEM to alert on risky NSG or RBAC configurations.&nbsp;</li>



<li>Enable Just-in-Time VM Access via Defender to reduce inbound port exposure during operational windows.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">2. Local Admin Accounts That Won’t Quit: The Risk of Skipping Entra ID (Azure AD) Authentication&nbsp;</h3>



<p><em>Local accounts are like leftover sushi: they might look fine, but they’re a hazard.&nbsp;</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">What to Watch For (Common Symptoms)</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>VMs or workloads accessed via local admin accounts, often shared informally among teams.&nbsp;</li>



<li>Applications or automation authenticate with static credentials embedded in code or stored insecurely.&nbsp;</li>



<li>Service accounts operating without lifecycle control, MFA, or logging.&nbsp;</li>
</ul>



<p>These shortcuts may speed things up, but they bypass every layer of modern identity security.&nbsp;</p>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Attackers love static secrets, and local accounts bypass modern identity controls. Entra ID bypass = no MFA, no audit trail, and a giant gap in zero-trust.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Are any VMs or workloads still using local admin accounts?</strong>&nbsp;<br>2.) <strong>Do any apps or scripts rely on embedded secrets?</strong>&nbsp;<br>3.) <strong>Are service accounts operating without logging or lifecycle management?</strong>&nbsp;</p>



<h4 class="wp-block-heading">Recommended Fixes</h4>



<p><strong>Enforce Entra ID Authentication First:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Enable Azure AD login for all VMs to centralize authentication and logging.&nbsp;</li>



<li>For Windows VMs, use Azure AD joined or Hybrid Join with AADLoginForWindows VM extension.&nbsp;</li>
</ul>



<p><strong>Replace Secrets with Managed Identities:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use System-assigned or User-assigned Managed Identities for Azure resources to access other services securely.&nbsp;</li>



<li>Eliminate secrets stored in code, environment variables, or key vaults.&nbsp;</li>
</ul>



<p><strong>Secure Administrative Access&nbsp;</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Disable direct local admin access wherever possible.&nbsp;</li>



<li>Leverage Azure Bastion or Just-in-Time (JIT) VM Access for secure admin connections.&nbsp;</li>



<li>Enforce session expiry, logging, and MFA via Privileged Identity Management (PIM) or conditional access.&nbsp;</li>
</ul>



<p><strong>Audit and Cleanup Local Admin Accounts:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Inventory all local admin accounts across VM fleets. Use PowerShell or CLI to enumerate accounts:<br><code>Get-LocalGroupMember -Group "Administrators"</code></li>



<li>Regularly rotate or remove local accounts not tied to valid operational workflows.&nbsp;</li>



<li>Schedule recurring reviews to prevent “set-and-forget&#8221; accounts.&nbsp;&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Detection</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Use tools like <strong>Microsoft Defender for Cloud</strong> and <strong>Microsoft Entra ID Identity Protection</strong> for continuous detection of anomalous sign-in behavior.&nbsp;</li>



<li>Focus on accounts that haven’t yet been migrated to Entra ID.&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">3. Stale Resources and Identity Sprawl: Why Azure Cleanup Can&#8217;t Wait</h3>



<p><em>Old VMs, unused accounts, orphaned disks&#8230; clutter isn’t just messy, it’s also super risky.&nbsp;</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong>What to Watch For (Common Symptoms)</strong>&nbsp;</h4>



<ul class="wp-block-list">
<li>Dormant service principals, legacy user accounts, or invalid Entra ID credentials left active.&nbsp;</li>



<li>Stopped or orphaned VMs, unattached disks, and retired resource groups still incurring cost or creating risk.&nbsp;</li>



<li>Resource sprawl caused by ad hoc deployments without naming standards, tagging, or lifecycle policies.&nbsp;</li>
</ul>



<p>Even well-managed environments accumulate this kind of “cloud waste” and unmanaged sprawl without guardrails. Not only does this create hidden risk, but it also makes audits, costs analysis, and compliance much harder than they need to be.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Dormant assets = unmonitored attack surface. Plus, they inflate costs and complicate audits.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Any identities or service principals not used in 90+ days?</strong>&nbsp;<br>2.) <strong>Stopped or deallocated VMs, unattached disks, or idle load balancers?</strong>&nbsp;<br>3.) <strong>Resources missing tags or lifecycle policies?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Audit Entra ID Objects:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Scan Entra ID users, groups, and service principals for inactivity:<br><code>(MSOL module deprecated in April): Get-<br>EntraInactiveSignInUser -LastSignInBeforeDaysAgo 90 -All</code></li>



<li>Remove or disable any identities not used in the past 90 days.&nbsp;</li>



<li>Rotate shared or service account credentials regularly.&nbsp;</li>
</ul>



<p><strong>Identify Stale Azure Resources:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use Azure Advisor and Cost Management to detect unused resources.&nbsp;</li>



<li>Enable Azure Resource Graph Explorer to query at scale across subscriptions:&nbsp;<br><code>resources<br>| where type == 'microsoft.compute/virtualmachines'<br>| extend powerState = tostring(properties.extended.instanceView.powerState.displayStatus)&nbsp;<br>| where powerState == 'VM deallocated' or powerState == 'VM stopped'&nbsp;<br>| project name, resourceGroup, powerState, location&nbsp;<br>| order by name asc&nbsp;</code></li>
</ul>



<p><strong>Apply Naming, Tagging, and Lifecycle Standards:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Adopt consistent resource naming conventions and tagging requirements for ownership, environment, and expiration.&nbsp;</li>



<li>Automate tagging via deployment pipelines or Azure Policy for consistency.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Automate Cleanup</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Build recurring workflows with Azure Automation runbooks or Logic Apps.</li>



<li>Flag inactive objects and notify resources owners before automatic removal.</li>
</ul>



<h3 class="wp-block-heading">4. Missing Logs = Blind Security: Missing Log Configuration on Azure Resources</h3>



<p><em>No logs = no visibility. Without proper logging, breaches, misconfigurations, or insider activity can fly under the radar.&nbsp;</em>&nbsp;</p>



<p>Logging is the backbone of cloud observability and security. Yet, in many Azure environments, critical resources are provisioned without proper diagnostic settings, leaving teams without visibility into performance, access, or potential compromise.&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Common Symptoms</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Resources like Virtual Machines, Storage Accounts, Key Vaults, Databases, and App Services do not have diagnostic logs enabled.&nbsp;</li>



<li>Logs aren’t routed to a central Log Analytics Workspace (LAW), SIEM, or secure storage.&nbsp;</li>



<li>Inconsistent or absent log retention policies across teams or subscriptions.&nbsp;&nbsp;</li>
</ul>



<p>Without logs, security teams operate blind, and incidents may only be discovered after significant damage.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Why It Matters</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>Logs are the foundation of detection, investigation, and compliance. Without them, you’re flying blind.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Are all critical resources logging to a central destination?</strong>&nbsp;<br>2.) <strong>Are retention policies consistent and compliant?</strong>&nbsp;<br>3.) <strong>Are diagnostic settings deployed at scale for all subscriptions and management groups?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Enforce Diagnostic Settings at Scale</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use built-in Azure Policies to automatically audit and deploy diagnostics, such as:&nbsp;<br>&#8211; Audit Diagnostic Settings&nbsp;<br>&#8211; Deploy Diagnostic Settings for Key Vault&nbsp;<br>&#8211; Audit VMs without Monitoring Agent&nbsp;</li>



<li>Assign these policies at management group or subscription level for wide coverage.&nbsp;</li>
</ul>



<p><strong>Confirm Logging Across Resource Types</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>List diagnostic settings for resource groups or resource types using the CLI:<br>&nbsp;<br>az monitor diagnostic-settings list &#8211;resource-group &lt;resource-group-name&gt;&nbsp;<br></li>



<li>Identify gaps and generate a remediation plan based on priority.&nbsp;</li>
</ul>



<p><strong>Centralize Log Routing and Retention</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Forward logs to:&nbsp;<br>&#8211; A Log Analytics Workspace (LAW) for structured queries and alerts&nbsp;<br>&#8211; A SIEM platform (e.g., Microsoft Sentinel, Elastic, SentinelOne Singularity) for threat detection&nbsp;<br>&#8211; Or secure storage with immutable retention policies for compliance&nbsp;</li>
</ul>



<p><strong>Enable Additional Monitoring Signals</strong>&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Activity Logs: </strong>Track control-plane activity and administrative actions.&nbsp;</li>



<li><strong>VMInsights:</strong> Provide rich OS-level visibility for virtual machines.&nbsp;</li>



<li><strong>Defender for Cloud logs:</strong> Monitor workload-level vulnerability and threat detection.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Coverage</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Build a “Log Coverage Report” with Azure Monitor Workbooks or custom Resource Graph queries.&nbsp;&nbsp;</li>



<li>Use this to continuously assess and visualize log gaps across all assets in your tenant.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">5. Azure Admins Without PIM or Role Controls: A Ticking Time Bomb</h3>



<p><em>Without Just-in-Time (JIT) and Privileged Identity Management (PIM), a single compromised admin can put your entire environment at risk.</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">What to Watch For (Common Symptoms)</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>High-privilege roles (Global Admin, User Access Administrator, Owner) assigned permanently to user accounts or groups.&nbsp;</li>



<li>No guardrails in place for role assignment, expiration, or user justification.&nbsp;</li>



<li>Lack of auditing or monitoring on administrative role usage.&nbsp;</li>
</ul>



<p>Permanent admin assignments create a latent breach vector. Attackers are big fans of accounts that never expire.&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Why It Matters</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>Violates least privilege and zero trust. Attackers actively target standing admin roles to move laterally. Compliance frameworks demand temporary, auditable, controlled privileged access.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Which users or groups hold permanent high-privilege roles?</strong>&nbsp;<br>2.) <strong>Are there no approval workflows or time limits in place?</strong>&nbsp;<br>3.) <strong>Is JIT VM access enabled for administrative connections?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Enable Privileged Identity Management (PIM)</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Apply PIM to all high-impact roles including:&nbsp;<br>&#8211; Global Administrator&nbsp;<br>&#8211; Security Administrator&nbsp;<br>&#8211; Owner, Contributor (for resource-level RBAC)&nbsp;</li>



<li>Enforce: <br>&#8211; Time-bound access (e.g., 4-hour windows)&nbsp;<br>&#8211; Justification and MFA for elevation&nbsp;<br>&#8211; Approval workflows for sensitive roles&nbsp;</li>
</ul>



<p><strong>Audit and Rotate Standing Privileges</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Review all current assignments to high-privilege roles by navigating to the Azure Portal and exporting the assignment list from PIM.&nbsp;</li>



<li>Remove or transition permanent assignments to eligible assignments under PIM.&nbsp;</li>



<li>Use Continuous Access Evaluation (CAE) in Entra ID to revoke access quickly if user risk changes or session anomalies are detected.&nbsp;</li>
</ul>



<p><strong>Apply Just-In-Time Access</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>In addition to PIM for identity roles, configure Just-in-Time VM access via Defender for Cloud.&nbsp;</li>



<li>This locks down inbound RDP/SSH and only opens access upon authorized request for a limited time.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Monitoring</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Integrate audit logs from PIM and JIT into a SIEM (e.g., Microsoft Sentinel).</li>



<li>Monitor privilege elevations to detect unusual patterns and get early warnings on potential misuse.&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">CSPM Assessment: Fast, Focused, Continuous</h2>



<p>Traditional audits provide only a snapshot in time. Azure environments evolve constantly, and point-in-time reviews cannot keep up. Cloud Security Posture Management, or CSPM, changes that. It delivers automated visibility, intelligent detection, and prioritized remediation, giving your team both immediate and ongoing security improvements. </p>



<p><strong>Bottom line:</strong> CSPM turns “Oops, Azure did it again” into “Got it covered.”</p>



<h3 class="wp-block-heading">Why CSPM Matters</h3>



<p>Even small misconfigurations can have major consequences:</p>



<ul class="wp-block-list">
<li><strong>Ransomware exposure</strong>&nbsp;– open ports and stale accounts are actively exploited.</li>



<li><strong>Compliance failures</strong>&nbsp;– HIPAA, PCI DSS, ISO 27001, and other frameworks require proper access controls and audit trails.</li>



<li><strong>Unexpected downtime</strong>&nbsp;– misconfigurations can disrupt critical workloads.</li>



<li><strong>Reputational damage</strong>&nbsp;– customers expect reliable operations, not incident disclosures.</li>
</ul>



<p>CSPM gives you continuous, automated insight into your environment. It identifies the misconfigurations that cause the most risk, including overly permissive access, stale identities, missing logs, credential misuse, and standing admin privileges. Every finding is tied to context, severity, business impact, and compliance requirements, so you know exactly what to fix first.</p>



<p>With CSPM in place, you move from reacting to incidents to preventing them. From scrambling before audits to walking in prepared. From hoping you are secure to knowing exactly where you stand.</p>



<h3 class="wp-block-heading">What You Get with a CSPM Assessment</h3>



<p>A CSPM assessment from Fortress SRM is conducted by our veteran cloud security analysts using modern tooling to deliver rapid visibility, automated detection, and actionable remediation tailored to your Azure environment.</p>



<ul class="wp-block-list">
<li><strong>Rapid visibility</strong>&nbsp;– every user, resource, and permission across your Azure tenant.</li>



<li><strong>Automated detection</strong>&nbsp;– misconfigurations and security gaps with context and priority.</li>



<li><strong>Actionable remediation</strong>&nbsp;– clear, tailored steps for your environment.</li>



<li><strong>Continuous posture improvement</strong>&nbsp;– structured, ongoing cloud security management.</li>
</ul>



<h4 class="wp-block-heading">Next Step</h4>



<p>Do not wait for an auditor or an attacker to uncover your risks. Fortress SRM provides hands-on support and continuous improvement to help you stay ahead of threats and ensure compliance.</p>



<p><strong>Contact Fortress SRM to schedule your Azure CSPM Assessment and see exactly where your risks are and how to fix them fast.</strong></p>


<script type="text/javascript">
/* <![CDATA[ */
var gform;gform||(document.addEventListener("gform_main_scripts_loaded",function(){gform.scriptsLoaded=!0}),document.addEventListener("gform/theme/scripts_loaded",function(){gform.themeScriptsLoaded=!0}),window.addEventListener("DOMContentLoaded",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>"function"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn("The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1."),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener("gform_main_scripts_loaded",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener("gform/theme/scripts_loaded",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener("DOMContentLoaded",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook("action",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook("filter",o,r,e,t)},doAction:function(o){gform.doHook("action",o,arguments)},applyFilters:function(o){return gform.doHook("filter",o,arguments)},removeAction:function(o,r){gform.removeHook("action",o,r)},removeFilter:function(o,r,e){gform.removeHook("filter",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+"_"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){"function"!=typeof(t=o.callable)&&(t=window[t]),"action"==r?t.apply(null,e):e[0]=t.apply(null,e)})),"filter"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});
/* ]]&gt; */
</script>

                <div class='gf_browser_chrome gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/category/uncategorized/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>Phone</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='deyEnjPMazvOHriDG3m4o2nMwHKEuKM5/FE+rbAPh3D10WaijjTmIstLY5Te8tCFCUTheSnh8j3X9SE8c3g6eIQum+Yh31VQOwMzPOh4B2G7gpU=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="183"/><script type="text/javascript">
/* <![CDATA[ */
document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );
/* ]]&gt; */
</script>
</p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrm.com/oops-azure-did-it-again-5-risks-you-cant-ignore/">Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>I’m Not a Target for Cybercrime. Or Am I?</title>
		<link>https://fortresssrm.com/im-not-a-target-for-cybercrime-or-am-i/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Wed, 01 Jun 2022 17:44:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=954</guid>

					<description><![CDATA[<p>Are you a target for cybercrime? Spoiler alert: Yes, you are. Regardless of what your business does, what industry it operates in, or what size it is – you ARE ...</p>
<p>The post <a href="https://fortresssrm.com/im-not-a-target-for-cybercrime-or-am-i/">I’m Not a Target for Cybercrime. Or Am I?</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Are you a target for cybercrime?</p>



<p>Spoiler alert: Yes, you are.</p>



<p>Regardless of what your business does, what industry it operates in, or what size it is – you ARE a target for cybercrime.</p>



<p>Let’s look at the statistics.</p>



<ul class="wp-block-list"><li>43% of all data breaches involve small and medium-sized businesses (Verizon, 2022)</li><li>61% of all SMBs have reported at least one cyber-attack during the previous year (Verizon, 2022)</li><li>43% of SMBs have no cybersecurity defense plan in place, leaving their financial, customer and business data at risk (BullGuard, 2020)</li><li>$2.98M is the average cost of a data breach for SMBs with fewer than 500 employees (Ponemon Institute, 2021)</li><li>While any business with a computer system is at risk, the most targeted industries are in finance and insurance, manufacturing, professional services, and healthcare (IBM, 2021)</li></ul>



<p>Summary: SMBs are absolutely at risk for cybercrime.</p>



<p>Let’s put the size of this problem in perspective: If cybercrime was measured as a country, it would be the world&#8217;s third-largest economy behind the US and China. (Cybersecurity Ventures, 2022)</p>



<p>Bringing awareness to the cybercrime issue is the first step towards solving it, because the problem is only getting worse.</p>



<ul class="wp-block-list"><li>Cybersecurity Ventures predicts cybercrime will grow 15% per year, reaching $10.5 trillion annually by 2025</li><li>It is estimated that ransomware attacks will increase in frequency, from every 11 seconds in 2021 to every 2 seconds by 2031 (Cybersecurity Ventures, 2022)</li><li>In a recent survey of 500 CEOs, 18% said cybersecurity risk is the largest threat to their organization’s growth through 2024, up from 10% in 2020 (KPMG, 2021)</li></ul>



<p>On the positive side, there is a growing awareness of cybersecurity risk.</p>



<ul class="wp-block-list"><li>Global spending on security awareness training for employees will reach $10 billion by 2027 (Cybersecurity Ventures, 2022)</li><li>Gartner predicts that 40% of company boards will have a dedicated cybersecurity committee by 2025 (Gartner, 2021) and that by 2024, 75% of CEOs will be personally liable for cybersecurity incidents (Gartner, 2020)</li></ul>



<p>These statistics are probably low because cybercrime is typically undercounted; most are never reported due to organizational embarrassment, fear of brand damage, and the belief that law enforcement can’t do anything to help. Some experts estimate as few as 10% of cybercrimes are reported. (Cybersecurity Ventures, 2022)</p>



<p>As more and more SMBs evolve digitally, cybersecurity becomes more important. On average, 72% of any organizations&#8217; customer interactions are digital (MuleSoft, 2022) and that means the likelihood of being a target for cybercriminals increases. It doesn’t matter if your organization has, uses, or creates data – just being a business that a cybercriminal can target is enough to put you at risk.</p>



<p>Another significant area of cyber risk are your third-party relationships. More and more organizations are being asked by their partners to prove cybersecurity systems are in place before filling out RFPs or RFQs or engaging in business with them. Marketing agencies, accounting and payroll firms, payment processors, and software platforms are being told to become cyber secure or risk losing business.</p>



<p>Cyber threats are increasing every day and organizations of all sizes and in all industries are at risk of ransomware attacks, malware infections, insider threats, and data breaches.</p>



<p>Your organization has 2 options: 1) be proactive and protect yourself before it happens, or, 2) be reactive and remediate the damage when it happens.</p>



<p><strong>Are you confident in your current cyber risk strategy and execution?<br></strong>If you’d like to have a confidential conversation with one of our cybersecurity experts to improve your security posture, we’re here to help.</p>



<p><strong>About Fortress:</strong>&nbsp;<br>Fortress Security Risk Management protects companies&nbsp;from the financial, operational, and emotional ravages of&nbsp;cybercrime by&nbsp;enhancing&nbsp;the performance of their people, processes, and technology.&nbsp;&nbsp;</p>



<p>Offering a robust co-managed solution to enhance an internal IT team’s capability and capacity, Fortress features a full suite of managed security services (SOC, patching, EDR, backups) plus specialized services like Cybersecurity-as-a-Service, Incident Response including disaster recovery &amp; remediation, M&amp;A cyber due diligence, GRC advisory, identity &amp; access management, threat management, vulnerability assessments, and technical testing.&nbsp;With headquarters in Cleveland, Fortress supports companies with both domestic and international operations.&nbsp;</p>



<p>In Case of Emergency:&nbsp;<br><strong>Cyber Attack Hotline: 888-207-0123 | Report an Attack: IR911.com&nbsp;&nbsp;</strong><strong></strong></p>



<p>For Preventative and Emergency Resources, please visit: <br><strong><a href="https://ransomwareclock.org/" target="_blank" rel="noreferrer noopener">RansomwareClock.org</a></strong></p>
<p>The post <a href="https://fortresssrm.com/im-not-a-target-for-cybercrime-or-am-i/">I’m Not a Target for Cybercrime. Or Am I?</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fortress Recognized in the Security 100 Category on CRN’s 2022 MSP 500 List</title>
		<link>https://fortresssrm.com/fortress-srm-recognized-on-crn-2022-msp-500-list/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Tue, 15 Feb 2022 12:36:42 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=922</guid>

					<description><![CDATA[<p>Cleveland, OH February 14, 2022 — Fortress Security Risk Management, announced today that CRN®, a brand of The Channel Company, has named Fortress to its Managed Service Provider (MSP) 500 ...</p>
<p>The post <a href="https://fortresssrm.com/fortress-srm-recognized-on-crn-2022-msp-500-list/">Fortress Recognized in the Security 100 Category on CRN’s 2022 MSP 500 List</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Cleveland, OH February 14, 2022 —</strong> Fortress Security Risk Management, announced today that <a href="https://www.crn.com">CRN<strong><sup>®</sup></strong></a>, a brand of <a href="https://www.thechannelco.com/">The Channel Company</a>, has named Fortress to its Managed Service Provider (MSP) 500 list in the Security 100 category for 2022. CRN’s annual MSP 500 list identifies the leading service providers in North America whose forward-thinking approaches to managed services are changing the landscape of the IT channel, helping end users increase efficiency and simplify IT solutions, while maximizing their return on investment.</p>



<p>With many customers still recovering from the impact of the ongoing pandemic, MSPs have become a vital part of the success of businesses worldwide. MSPs not only empower organizations to leverage intricate technologies but also help them keep a strict focus on their core business goals without straining their budgets.</p>



<p>The annual MSP 500 list is divided into three sections: the MSP Pioneer 250, recognizing companies with business models weighted toward managed services and largely focused on the SMB market; the MSP Elite 150, recognizing large, data center-focused MSPs with a strong mix of on- and off-premises services; and the Managed Security 100, recognizing MSPs focused primarily on off-premises and cloud-based security services.</p>



<p>Fortress was selected for their approach to full-spectrum cybersecurity in combination with working with world-class tools, all while leading their clients to a more secure future.</p>



<p>“In addition to having to adjust their own business operations to account for the changed conditions during the pandemic, MSPs have also seen increased demand for their managed communications, collaboration and security services,” said Blaine Raddon, CEO of The Channel Company. “The solution providers on our 2022 MSP 500 list deserve credit for their innovative and game-changing approaches to managed services in these unpredictable times, as well as their ability to optimize operational efficiencies and systems without straining IT budgets.”</p>



<p>“Fortress is honored to be included in CRN’s MSP 500 list,” says Andy Jones, CEO of Fortress, “We have been working hard for our clients and look forward to continuing to secure more organizations in 2022.” </p>



<p>The MSP 500 list can be found in the February 2022 issue of CRN and online at <a href="https://www.CRN.com/msp500">www.crn.com/msp500</a></p>
<p>The post <a href="https://fortresssrm.com/fortress-srm-recognized-on-crn-2022-msp-500-list/">Fortress Recognized in the Security 100 Category on CRN’s 2022 MSP 500 List</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
