AD360 | November 10, 20213 must-dos for IT admins in healthcare organizations to secure patients' data and privacy Since the beginning of the pandemic, there has been an increase in the volume of sensitive...
ADAudit Plus | November 3, 2021What causes repeated account lockouts and how to resolve them A stringent account lockout policy is vital to derail password guessing and brute-force...
AD360 | October 28, 2021Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book] Ransomware attacks continue to rattle organizations across the globe. Especially worrisome...
RecoveryManager Plus | October 21, 2021Microsoft's shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book] Use of Azure AD and Microsoft 365 has steadily increased over the past few years, and...
ADManager Plus | October 12, 2021Enhance ADManager Plus security using the Product Security Hardening feature Product Security Hardening is an option that has been added to ADManager Plus in version...
M365 Manager Plus | October 6, 2021[Free e-book] How to protect Microsoft 365 from the NOBELIUM hackers' phishing attack NOBELIUM is the group behind the SUNBURST backdoor, TEARDROP malware, GoldMax malware,...
M365 Manager Plus | September 23, 2021[Free e-book] The Office of Inspector General's (OIG's) Microsoft 365 audit checklist What is the OIG? OIG stands for Office of Inspector General, which is part of the U.S....
ADSelfService Plus | September 17, 2021How brute-force attacks are spearheading ransomware campaigns Ransomware groups have been exploiting the switch to remote work unlike any other....
AD360 | September 2, 20213 reasons SMBs are more vulnerable to cyberattacks than large enterprises Details about cyberattacks on small-and-medium-sized businesses (SMBs) may not make it to...
PAM360 | June 17, 2021Evolution of privileged access management: Serving modern enterprises' expanding use cases [Expert-led webinar] Organizations have long been upgrading their digitization game, and more rigorously so...
PAM360 | June 15, 2021The Colonial Pipeline ransomware attack: Lessons for cybersecurity teams The recent ransomware attack on Colonial Pipeline is...
AD360 | April 16, 2021Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations On March 9, 2021, Verkada, a software company that specializes in making security cameras...