logo
July 3, 2020 | Mike Tierney

Data Security in Cloud Computing: Key Components

Businesses of all sizes are moving to the cloud to take advantage of the greater data availability, significant cost savings and data redundancy that cloud computing provides compared to a traditional data center-based physical infrastructure. Moving to the cloud can also reduce shadow IT and get...
June 12, 2020 | Ryan Brooks

10 Security Tips for Malware Prevention

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to: Protect sensitive information and critical...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
May 22, 2020 | Simon Fernand

How to Ensure Security of Google Drive for Business Use

It’s no secret that Google dominates the digital realm: internet searches, email, cloud storage, file sharing and more. Today, over 5 million businesses use G Suite, a set of intelligent and collaborative tools that includes Gmail, Google Docs, Google Slides, Google Sheets and Google...
May 21, 2020 | Jeff Melnick

External Users and Guest Access in Microsoft Teams: A Complete Guide

Microsoft Teams is the device-agnostic, all-in-one cloud collaboration platform for Microsoft 365 users. With its open and flexible permissions policies, Teams lets you communicate and share content with other users, both inside and outside your organization. However, external collaboration...
July 6, 2020 | Maurizio Taglioretti

GoDaddy Data Breach

GoDaddy, the world's largest domain registrar, has confirmed that 28,000 of customer web hosting accounts were compromised in a security incident in October 2019. GoDaddy has over 19 million customers, 77 million managed domains and millions of hosted websites. Here’s what you need to know about...
May 20, 2020 | Jeff Melnick

5 Tips for Hardening Microsoft Teams Security

Overview of Microsoft Teams Microsoft Teams is an online collaboration platform that empowers team members to work together seamlessly and productively. A part of the Office 365 suite, Microsoft Teams runs on Windows, Mac, Linux, iOS and Android, enabling remote communication across virtually...
April 17, 2020 | Jeff Melnick

File Integrity Monitoring: Definition, Benefits and Key Features

File integrity monitoring  is crucial for the security of an organization’s information systems, as well as for regulatory compliance. This article will explore what file integrity monitoring is and help you find the right file integrity monitoring software solution for your...
April 17, 2020 | Matt Middleton-Leal

How Can You Ensure Data Security when Everyone Goes Remote?

Companies around the globe are encouraging their employees to work remotely to deal with the risks that the COVID-19 pandemic poses to everyone, and in some regions, employees have already been forced to transition to their home offices by local authorities. In this time of sudden and unprecedented...
April 1, 2020 | Ryan Brooks

Time to Shift from Threat-Centric Security towards Data-Centric Security

In today's assume-breach era, constantly chasing the latest threat isn't a viable strategy for data protection. Data threats will continue to grow in frequency and scale. Last year, 60% of companies experienced a ransomware attack, and analysts predict that this threat vector will continue grow...
Show more articles
...