Office 365 Groups and How to Manage Them

Office 365 groups enable users to access information in a variety of places, including SharePoint or OneDrive for Business document libraries, OneNote files, shared inboxes or calendars on Exchange Online, Lync or Skype for Business meetings, or Dynamics CRM databases. Office 365 groups are objects in Azure Active Directory, so they are not available in … Continued

Top 10 Cyber Attack Maps and How They Can Help You

Cyber attacks are becoming more common and more sophisticated every year, and cybersecurity professionals often find themselves struggling to keep up. Cyber attack maps are a valuable tool that can give them the information they need to stay ahead of attacks. Here are the top ten cyber attack maps and what you can learn from … Continued

What’s Lost in All the Buzz: 10 Cyber Essentials You Need before Machine Learning

IT security vendors often promote tempting cutting-edge technologies that claim to solve most of your cybersecurity issues. It is easy to get sucked in by buzzwords like UEBA (user and entity behavior analytics), AI (artificial intelligence), machine learning and advanced analytics, but a deeper look often reveals a harsh reality. Blind faith in vendors’ magic … Continued

Best SharePoint Reporting Tools

SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. Because documents are constantly being created, modified and deleted across your SharePoint environment it is vital for security and usage reasons to track who has access to what documents and who modifies them, as well to understanding SharePoint access permissions and know who … Continued

[Infographics] IT Risks for the Healthcare Industry: Expectations vs. Reality

Netwrix conducted its 2018 IT Risks Survey to learn more about how organizations deal with six common IT risks: physical damage, intellectual property theft, data loss, data breaches, system disruption and compliance penalties. We have extracted some interesting data shared by 140 healthcare organizations to learn more about how the industry perceives its threats. Mainly, … Continued

Most Useful SharePoint PowerShell Commands

SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. To configure SharePoint site settings, system administrators often use the SharePoint Management Shell that is installed with the SharePoint product. Running the SharePoint Management Shell calls the Windows PowerShell runtime environment and executes a script file named sharepoint.ps1, which loads the Windows PowerShell … Continued

Security and Business Leadership: How CISOs Should Talk to the Board

In today’s digital world, a technology risk is a business risk. With data breaches and ransomware constantly making headlines and hitting revenue, boardrooms are finally accepting the importance of managing security risks more effectively. However, they still often see CISOs primarily as impediments, notorious for their superpower to slow down and complicate any project for … Continued

Using PowerShell to Create ZIP Archives and Unzip Files

Sometimes it can be useful to programmatically create zip archives or extract files from existing archives. Windows PowerShell 5.0 added two cmdlets for doing just that. The Compress-Archive cmdlet enables you to create new archives from folders or individual files and to add files to archives; Extract-Archive can be used to unzip files. If you … Continued

CISSP Training Courses: From Boot Camps 2018 to Online Resources

When it comes to information security credentials, the Certified Information Systems Security Professional (CISSP) from (ISC)2 is a must-have for serious IT information security professionals. Globally recognized, the CISSP is the pinnacle credential in the (ISC)2 certification portfolio. Earning the CISSP designation is difficult. Candidates must have a minimum of five years of paid professional … Continued