logo

What to Know about a Data Security Breach

Data breach definition A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers. A data breach is different from data loss, which is when data can no longer be accessed because of a hardware failure, deletion or other cause. Protected data can include … Continued

Office 365 Groups and How to Manage Them

Office 365 groups enable users to access information in a variety of places, including SharePoint or OneDrive for Business document libraries, OneNote files, shared inboxes or calendars on Exchange Online, Lync or Skype for Business meetings, or Dynamics CRM databases. Office 365 groups are objects in Azure Active Directory, so they are not available in … Continued

Top 10 Cyber Attack Maps and How They Can Help You

Cyber attacks are becoming more common and more sophisticated every year, and cybersecurity professionals often find themselves struggling to keep up. Cyber attack maps are a valuable tool that can give them the information they need to stay ahead of attacks. Here are the top ten cyber attack maps and what you can learn from … Continued

What’s Lost in All the Buzz: 10 Cyber Essentials You Need before Machine Learning

IT security vendors often promote tempting cutting-edge technologies that claim to solve most of your cybersecurity issues. It is easy to get sucked in by buzzwords like UEBA (user and entity behavior analytics), AI (artificial intelligence), machine learning and advanced analytics, but a deeper look often reveals a harsh reality. Blind faith in vendors’ magic … Continued

A Brief Guide to Help You Choose the Best SharePoint Reporting Tool

Microsoft SharePoint is widely used by organizations to enhance collaboration, manage documents and streamline access to information. Users can easily store and organize documents, and collaborate effectively through shared workspaces, document libraries and lists. They can even open and edit Microsoft Office documents directly from SharePoint. SharePoint Online is part of Microsoft 365. However, ensuring … Continued

[Infographics] IT Risks for the Healthcare Industry: Expectations vs. Reality

Netwrix conducted its 2018 IT Risks Survey to learn more about how organizations deal with six common IT risks: physical damage, intellectual property theft, data loss, data breaches, system disruption and compliance penalties. We have extracted some interesting data shared by 140 healthcare organizations to learn more about how the industry perceives its threats. Mainly, … Continued

Most Useful SharePoint PowerShell Commands

SharePoint Server is a web-based collaborative platform that integrates with Microsoft Office. To configure SharePoint site settings, system administrators often use the SharePoint Management Shell that is installed with the SharePoint product. Running the SharePoint Management Shell calls the Windows PowerShell runtime environment and executes a script file named sharepoint.ps1, which loads the Windows PowerShell … Continued

Security and Business Leadership: How CISOs Should Talk to the Board

In today’s digital world, a technology risk is a business risk. With data breaches and ransomware constantly making headlines and hitting revenue, boardrooms are finally accepting the importance of managing security risks more effectively. However, they still often see CISOs primarily as impediments, notorious for their superpower to slow down and complicate any project for … Continued

Using PowerShell to Create ZIP Archives and Unzip Files

Sometimes it can be useful to programmatically create zip archives or extract files from existing archives. Windows PowerShell 5.0 added two cmdlets for doing just that. The Compress-Archive cmdlet enables you to create new archives from folders or individual files and to add files to archives; Extract-Archive can be used to unzip files. Handpicked related … Continued

CISSP Training Courses: From Boot Camps 2018 to Online Resources

When it comes to information security credentials, the Certified Information Systems Security Professional (CISSP) from (ISC)2 is a must-have for serious IT information security professionals. Globally recognized, the CISSP is the pinnacle credential in the (ISC)2 certification portfolio. Earning the CISSP designation is difficult. Candidates must have a minimum of five years of paid professional … Continued