Cyber Chief Magazine: Top trends shaping management priorities in 2020 Download Now
16 September, 2016 | Jonathan Hassell

2 Rules to Secure Office 365 Password Policy Setup

Password policy in Office 365 is much stricter and more secure than that of an on-premises application,  so you no longer have to worry about setting and enforcing different authentication policies for your users. But still, you should align Office365 security settings with your overall enterprise...
20 April, 2016 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
28 December, 2015 | Richard Muniz

What To Do about Passwords in Your Disaster Recovery Plan

One post thread on Spiceworks caught my eye.  The Spicehead wanted to know what to do about passwords when it came to DR plans.  Was he supposed to put the passwords into it, or just what was he supposed to do with them.  Well, the first thing you don’t want to do is put them in the Disaster...
17 July, 2015 | Russell Smith

Office of Personnel Management Hacked Again

Not for the first time in the past twelve months the United States Office of Personnel Management (OPM), an independent government agency that manages the civil service, announced 21.5 million background check records were compromised in a security breach, along with 1.1 million fingerprints and...
26 June, 2015 | Richard Muniz

Securing a Password Manager

A young man became aware that there was a large safe in the local pool hall. Of course something that big and on such display drew a lot of attention, and attention became speculation which in turn turned to greed. The owner had opened the safe once in their presence and it was full of money. And...
4 February, 2015 | John O'Neill Sr.

Stopping Skeleton Key Malware from Causing Data Breaches

Proving the old adage that “criminals never sleep,” a new piece of malware is making headlines. The aptly named Skeleton Key malware, detected in mid-January, bypasses the password authentication protection of Active Directory. Just as skeleton keys from the last century unlocked any door in a...