logo

11 Steps to Insider Threat Mitigation

Have you ever considered that your employees could be putting your organization’s most valuable information assets at risk? This article details key best practices for mitigating insider threats through extended visibility into data activity, systems and users — and offers a solution that can help, without eating up entire IT budget or dragging down system … Continued

7 Ransomware Myths Busted

Of today’s cyber security threats, ransomware is a modern scourge. Even though it has made a number of headlines in the past couple of years, ransomware is still surrounded by myths. Dispelling those myths is one of the key factors of developing an effective information security strategy. Here are the top seven ransomware myths, busted: … Continued

Visibility Tips: Who Has Access to Mailbox?

Most organizations with more than 10 or 20 people on staff that are running either Exchange Server on premises or Office 365 in the cloud have mailboxes that are shared on some level. These scenarios could include the following: An executive or manager that generally handles his own tasks but offers delegated access to his … Continued

5 Free Exchange Security Tools You Probably Don’t Know About

Exchange email security is a huge front to defend. There are now so many attack surfaces that it can be hard to decide how to start. Here are a few things that you might want to consider when thinking about your Exchange infrastructure security setup. This is by no means a full list. 1. Full Access … Continued

Tips to Improve Privileged Accounts Security

In this article, I’ll take a look at how Privileged Access Management (PAM) in Windows Server 2016 enables Just-In-Time (JIT) Administration, helping to secure privileged user accounts. It seems like a problem as old as computing itself, or, depending on your point of view, just a minor matter that doesn’t warrant losing too much sleep. … Continued