Establishing a least privilege environment in healthcare organizations [E-book]

Did you know that by selling a single health record on the dark web, an attacker can get as much as $1,000? It’s no wonder...

Log360 2 min read Read

A practical approach to Active Directory Domain Services, Part 6: FSMO roles in AD

Do new users created on one domain controller (DC) of an Active Directory (AD) environment, ever get erroneously deleted only after a few minutes by...

Active Directory 4 min read Read

Cyberattacks and protecting your cloud services [E-book]

2021 saw an increase in most types of cyberattacks. The number of ransomware attacks rose by 105% (to 623.3 million attacks) and encrypted threats increased by...

M365 Manager Plus 1 min read Read

A practical approach to Active Directory Domain Services, Part 4: AD groups and OUs

Active Directory (AD) objects are rarely managed as standalone entities. In Part 3 of this series, we covered practical exercises for creating and managing two of...

Active Directory , General 6 min read Read

A practical approach to Active Directory Domain Services, Part 3: Explore AD with user and computer accounts

How do you begin working with Active Directory Domain Services (AD DS)? If you have read the previous parts of this blog series, you will know...

Active Directory 8 min read Read

NOBELIUM’s phishing attacks: How to protect your Microsoft 365 setup [E-book]

In 2021, the Microsoft Threat Intelligence Center discovered a new malicious email campaign by NOBELIUM, a group of hackers that has carried out nation-state attacks, and...

M365 Manager Plus 2 min read Read

Protecting your Microsoft 365 services against NOBELIUM attacks [E-book]

In December 2020, Microsoft came forward with details regarding what is now being considered the most extensive, severe cyberattack in history—the NOBELIUM attack. This shocking...

M365 Manager Plus 2 min read Read

The handbook that every cybersecurity analyst needs [E-book]

The IT industry recognizes the drastic increase in cyberattacks in the past few years. With cybercriminals constantly evolving their attack tactics, IT security professionals need...

Log360 2 min read Read

4 golden reasons for equipping your SOC with ManageEngine Log360

Cyberattacks are fast becoming a part of our daily lives. Multiple sources such as Norton Security and Forbes suggest that since the pandemic, attacks are not only...

Log360 5 min read Read