Log360 | March 3, 2021Security operations center, Part 3: Finding your weakest link Any organization with data assets is a possible target for an attacker. Hackers use...
Log360 | February 18, 2021Dangerous defaults that put your IT environment at risk: IT security under attack In this blog in the “IT security under attack” series, we wanted to shed some light on an...
ADManager Plus | February 9, 2021Free Active Directory management tools: Part 5 - Replication, domain controller roles, and monitoring Replicate information between domain controllers (DCs), identify the roles assigned to the...
ADManager Plus | February 3, 2021Free Active Directory management tools: Part 4 - Terminal Session Manager and Last Logon Finder When your machine throws a "the server has exceeded the maximum number of allowed...
Log360 | January 21, 2021IT security under attack: Credential dumping attacks in Windows environments Most of the time, threat actors in the cybersecurity landscape don't employ advanced...
ADManager Plus | December 21, 2020Free Active Directory management tools: Part 3 - Generating CSVs and querying Active Directory Creating a CSV file containing all the required attributes of your entire workforce to...
Log360 | December 18, 2020IT security under attack: Why are group memberships so crucial? Security groups either make or break your IT security. Group memberships are responsible...
ADManager Plus | December 16, 2020Free Active Directory management tools: Part 2 - Migrate mailbox data with ease Have you ever wondered how organizations migrate inboxes, contacts, and calendars into new...
Log360 | December 15, 2020Securing a distributed workspace: A cybersecurity checklist for long-term remote work One of the lasting changes brought about by the COVID-19 pandemic is that it forced...
Log360 | December 8, 2020IT security under attack: A typical day in the life of an IT admin or security analyst The job of IT admins and IT security analysts are, without a doubt, some of the most...
ADSelfService Plus | December 2, 2020Five ways to hack MFA, and the FBI's mitigation strategy [E-book] Advances in technology have led to the creation of multiple data security methods that...
Exchange Reporter Plus | November 30, 2020CISA's recommendations to recognize and avoid email scams [E-book] Email has always been a popular tool for business communications. Unfortunately, it is...