CISA’s recommendations to recognize and avoid email scams [E-book]

Email has always been a popular tool for business communications. Unfortunately, it is also one of the weakest links in an organization’s security strategy. 94...

Exchange Reporter Plus 1 min read Read

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources...

ADSelfService Plus 2 min read Read

3 simple ways to drastically reduce Active Directory administration costs [E-book]

Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more...

ADManager Plus 1 min read Read

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain...

Log360 3 min read Read

Free for unlimited users: Password Expiration Notifier for Active Directory

Changing your password periodically is vital and helps prevent hackers from accessing your network resources and inflicting damage. If users fail to change their passwords...

ADSelfService Plus 2 min read Read

CISO’s guide to building an ironclad data loss prevention strategy [E-book]

“The Global Datasphere will grow from 45 Zettabytes (ZB) in 2019 to 175ZB by 2025.” – International Data Corporation (IDC) As data proliferates, traditional data...

DataSecurity Plus 1 min read Read

Fast-track bulk Microsoft 365 object creation with M365 Manager Plus

User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts...

M365 Manager Plus 2 min read Read

Free Active Directory management tools: Part 1 – Managing passwords

Passwords are the first line of cyberdefense, and an organization cannot afford to have weak passwords, poorly-configured password policies, or even worse, empty passwords. Discovering...

ADManager Plus 1 min read Read

Securing VPN and RDP access to sensitive resources [Free e-book and webinar]

At times, life during COVID-19 pandemic can feel like something from a dystopian novel. If anyone told us ahead of time that we’d be working from...

ADSelfService Plus 2 min read Read