logo

Quick Guide: How to Sync Your Active Directory to Office 365

Many organizations that use Office 365 have a hybrid deployment — that is, they also have an on-premises Active Directory, which is the primary storage for identity information. Learn how to enable integration of local AD data with your Office 365 environment using native Microsoft tools in this guide to Active Directory sync to Office … Continued

Understanding SharePoint Permissions

The Purpose of SharePoint Permissions SharePoint permissions control the access that employees, partners, third-party suppliers and others have to your SharePoint content. You can choose who can read specific information and who cannot. SharePoint permissions extend not only to display data in lists and document libraries, but also to search results and even the user … Continued

PII Discovery Tools You’ll Want to Check Out

Data breaches are being reported in the news on an almost daily basis. And with new compliance regulations, like GDPR, being introduced on a regular basis, discovering and classifying data is becoming an increasingly important task for organizations of all types and sizes. But data classification is hard to do and often does not happen … Continued

Office 365 Administration Made Easy

Cloud solutions often promise to reduce administrative overhead by eliminating the need to install and maintain applications in the organization’s environment. Unfortunately, that does not always equate to less overload for administrators, because it’s still another system that needs to be set up and managed to ensure a positive experience for the company’s business users. … Continued

Must-Know Basics for Successful Office 365 Troubleshooting

Issues with Microsoft Office 365 can arise from problems with your local computers or your connection, problems with the Office 365 service itself, or issues with your Office 365 subscription payment. Microsoft offers troubleshooting tools to help you diagnose and resolve the problem. If you are an Office 365 admin, check out the following tools … Continued

[Infographics] IT Risks in Government Sector: Insiders vs. Hackers

We have used the data from 2018 IT Risks Survey to dive deeper into the problems facing federal, state and local government organizations. The survey covers the six most common types of IT risks: physical damage, intellectual property theft, data loss, data breaches, system disruption and compliance penalties. Not all government organizations deal with these … Continued

4 Questions CISOs Can Use to Get Executive Buy-in

All too often, the C-suite sees IT security projects as supermassive black holes that absorb millions of dollars but don’t give anything in return except a vague sense of security. CISOs, on the other hand, know that a strong cybersecurity posture can do far more than reduce the likelihood of security breaches; it can be … Continued

How to Configure and Manage Office 365 Message Encryption

Office 365 includes a powerful security feature, Office 365 Message Encryption (OME), that enables organizations to securely send sensitive information across an otherwise relatively insecure infrastructure — mail servers. OME combines email encryption with rights management capabilities powered by Azure Information Protection. The E3 and E5 plans of the Office 365 and Microsoft 365 suites … Continued

CCPA vs GDPR: What GDPR-Ready Companies Need to Know about the CCPA

As a response to the EU General Data Protection Regulation (GDPR), Facebook’s Cambridge Analytica scandal and the overall upsurge in personal data breaches, California passed a new data protection and data privacy law, the California Consumer Privacy Act (CCPA). Although the CCPA does not become effective until January 1, 2020, organizations need to know that, … Continued

Three Steps to Justify an Investment in IT Security

Since there is no such thing as 100% security, investments in it never seem to be enough. In regards to budgeting, the role of a CISO is to prioritize available resources based on the IT risks the organization faces and justify additional investments when needed to the executives. Easier said than done. Many CISOs still … Continued

Top 7 IT Security Trends in 2019

Across the IT security landscape, the year of 2018 was never prosaic or boring. We saw breaches of such giants as British Airways, Macy’s and Facebook, data privacy scandals around Google and Facebook (again), and the GDPR shakeup, to name just a few. Now it is time to look at what the next year may … Continued