General

Visit:

Top five tips for Office 365 security and compliance, Part 2

In our previous blog, we broadly discussed how our webinar Top five tips for Office 365 security and compliance will help you learn how to tackle some of your biggest security and compliance challenges. In this blog, we’ll discuss …

General 2 min read

Top five tips for Office 365 security and compliance, Part 1

Office 365 is a favorite target for hackers across the globe. Of all the messages sent to Office 365 inboxes in a single month, about 55 billion are spam or bulk emails, and 20 million contain some form of malware. …

General 1 min read

Halloween NCSAM contest for IT security experts!

With Halloween fast approaching, the search for the scariest costumes is underway. But as an IT security professional, what haunts you more? Coworkers dressed as ghosts, witches, and vampires? Or the thought of a cyberattack?

October may be all about …

General 1 min read

Is Google Sync a vector for data breaches?

Many users enable Google Sync so they can use one Google account for both personal and business purposes. Google Sync synchronizes bookmarks, browsing history, passwords, and extensions across Chrome browsers that are logged in under the same account, allowing users …

General 2 min read

Five worthy reads: The human factor in IT team and organizational success

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we take a look at how culture can play a pivotal role in your IT team and overall corporate

General 3 min read

There’s more to password security than hashed passwords

In 1967 Roger Needham, one of the first computer scientists to emphasize the need for computer security, invented the method of storing a hashed version of plaintext passwords. To this day, we still use this method to keep our passwords …

General 2 min read

Five worthy reads: Is your business safe from business email compromise?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the rising impact of man-in-the-email attacks on global businesses. 

In case you weren’t aware, email isn’t as …

General 3 min read

Secure access to multiple enterprise applications! ADSelfService Plus makes it twice as safe.

Enterprise applications have become an integral part of a tech user’s life. Although the utility and user experience of these applications have been getting better, the risk of cyber attacks has also been on the rise. That’s why it’s important …

General 2 min read

Simplifying security auditing, Part 4: Securing web servers 

Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL requests, and the age-old classic, denial of service (DoS) attacks. While there are specialized …

General 2 min read

Five worthy reads: Rise of the no-collar culture

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we look into the emergence of the no-collar workforce.

 

 

It’s no secret that people are skeptical of new …

General 2 min read