logo

9 Best Practices for Granting Oracle Privileges

Oracle has several features to allow you to improve the security of your database. One such feature is the ability to grant privileges to users. In this article, I’ll discuss what privileges are and list some best practices for their use. It will help you to gain more visibility into what’s going on in your Oracle … Continued

[Infographics] 2016 Cloud Security Report

Cloud is now a fully fledged part of the IT strategy for organizations, regardless of their size, industry or geographical distribution.  Main reasons for organizations to move to the cloud are scalability, better availability, cost savings and flexibility in resource utilization. Along with this benefits there are lot of challenges and concerns regarding cloud security. … Continued

Windows Information Protection: Your Private Security Helper

Windows Information Protection (WIP) provides organizations with a set of features to support a Mobile Device Management (MDM) system and enable separation of corporate and personal data to prevent leaks. In this article, I’ll explain how WIP works. Why Use WIP? As corporate data becomes increasingly mobile, leaving the confines of the office and traversing … Continued

Should Mailboxes Be Shared or Inactive?

When people leave the company, change roles, or departments get closed, oftentimes you’ll need to keep the messages and mailbox contents that accumulated while those accounts were in service. To do this used to be fairly simple for organizations that were running Exchange Server on premises deployments—you converted the mailbox in question to a shared … Continued