logo
September 17, 2020 | Jeff Melnick

Top 6 Security Threats in Cloud Computing and How to Mitigate Them

In this digital era, more companies are encouraging or requiring employees to work from home. In addition to allowing employees to access the corporate network using their own devices, they are also turning to cloud computing, which is cost-effective and scales easily. However, not all of these...
September 4, 2020 | Jeff Melnick

How to Detect Ransomware

The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to disrupt operations badly enough and long enough that the organization will pay the ransom.” The...
August 21, 2020 | Ryan Brooks

Cloud Storage Security: Common Issues, Best Practices and Software Solutions

Cloud storage has become mainstream. It is one of the fastest-growing segments of IT spending and an indispensable tool for many modern businesses. However, not enough is being done to secure data residing in the cloud. According to Gartner, 90% of organizations that fail to control public cloud...
September 17, 2020 | Mike Tierney

Data Security in Cloud Computing: Key Components

Businesses of all sizes are moving to the cloud to take advantage of the greater data availability, significant cost savings and data redundancy that cloud computing provides compared to a traditional data center-based physical infrastructure. Moving to the cloud can also reduce shadow IT and get...
June 12, 2020 | Ryan Brooks

10 Security Tips for Malware Prevention

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to: Protect sensitive information and critical...
May 29, 2020 | Yelena Geras

Improving Security through Vulnerability Management

The battle for information security has been escalating for a long time, but the recent explosion in remote work has taken the struggle to a whole new level. IT and security teams already overwhelmed by a constant flood of incoming data, cloud technologies and stringent compliance regulations are...
September 17, 2020 | Simon Fernand

How to Ensure Security of Google Drive for Business Use

It’s no secret that Google dominates the digital realm: internet searches, email, cloud storage, file sharing and more. Today, over 5 million businesses use G Suite, a set of intelligent and collaborative tools that includes Gmail, Google Docs, Google Slides, Google Sheets and Google...
September 17, 2020 | Jeff Melnick

External Users and Guest Access in Microsoft Teams: A Complete Guide

Microsoft Teams is the device-agnostic, all-in-one cloud collaboration platform for Microsoft 365 users. With its open and flexible permissions policies, Teams lets you communicate and share content with other users, both inside and outside your organization. However, external collaboration...
August 11, 2020 | Maurizio Taglioretti

GoDaddy Data Breach

GoDaddy, the world's largest domain registrar, has confirmed that 28,000 of customer web hosting accounts were compromised in a security incident in October 2019. GoDaddy has over 19 million customers, 77 million managed domains and millions of hosted websites. Here’s what you need to know about...
September 17, 2020 | Jeff Melnick

5 Tips for Hardening Microsoft Teams Security

Overview of Microsoft Teams Microsoft Teams is an online collaboration platform that empowers team members to work together seamlessly and productively. A part of the Office 365 suite, Microsoft Teams runs on Windows, Mac, Linux, iOS and Android, enabling remote communication across virtually...
Show more articles
...