In our previous blog, we broadly discussed how our webinar Top five tips for Office 365 security and compliance will help you learn how to tackle some of your biggest security and compliance challenges....
Top five tips for Office 365 security and compliance, Part 1
Office 365 is a favorite target for hackers across the globe. Of all the messages sent to Office 365 inboxes in a single month, about 55 billion...
Five worthy reads: The 5G digital metamorphosis
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how the impending...
Halloween NCSAM contest for IT security experts!
With Halloween fast approaching, the search for the scariest costumes is underway. But as an IT security professional, what haunts you more? Coworkers dressed as ghosts, witches, and vampires? Or the thought of a cyberattack? October may be...
Is Google Sync a vector for data breaches?
Many users enable Google Sync so they can use one Google account for both personal and business purposes. Google Sync synchronizes bookmarks, browsing history, passwords, and extensions across Chrome browsers...
Five worthy reads: The human factor in IT team and organizational success
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we take a look...
Are your IT management practices IoT-ready?
2017 was supposed to be the year of the Internet of Things (IoT)—the year that this highly-touted technology matured and started producing tangible results for organizations. However, the last...
Digital transformation: It’s a team game!
We recently collaborated with two key partners—The Economic Times and CIOKlub—to host a series of CIO forums across India. While the discussion topics ranged from artificial intelligence (AI) to age-old concerns about...
There’s more to password security than hashed passwords
In 1967 Roger Needham, one of the first computer scientists to emphasize the need for computer security, invented the method of storing a hashed version of plaintext passwords. To this day, we...