logo
November 9, 2018 | Jonathan Hassell

2 Rules to Secure Office 365 Password Policy Setup

Password policy in Office 365 is much stricter and more secure than that of an on-premises application,  so you no longer have to worry about setting and enforcing different authentication policies for your users. But still, you should align Office365 security settings with your overall enterprise...
July 6, 2020 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
February 25, 2019 | Richard Muniz

What To Do about Passwords in Your Disaster Recovery Plan

One post thread on Spiceworks caught my eye.  The Spicehead wanted to know what to do about passwords when it came to DR plans.  Was he supposed to put the passwords into it, or just what was he supposed to do with them.  Well, the first thing you don’t want to do is put them in the Disaster...
July 6, 2020 | Vlad de Ramos

The Importance of Two Factor Authentication in Information Security

Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel confident of it or sleep soundly at night thinking that everything is secure, they will likely...
October 29, 2019 | Russell Smith

Office of Personnel Management Hacked Again

Not for the first time in the past twelve months the United States Office of Personnel Management (OPM), an independent government agency that manages the civil service, announced 21.5 million background check records were compromised in a security breach, along with 1.1 million fingerprints and...
March 27, 2019 | John O'Neill Sr.

Stopping Skeleton Key Malware from Causing Data Breaches

Proving the old adage that “criminals never sleep,” a new piece of malware is making headlines. The aptly named Skeleton Key malware, detected in mid-January, bypasses the password authentication protection of Active Directory. Just as skeleton keys from the last century unlocked any door in a...
...