Identity and access management | April 26, 2022A practical approach to Active Directory Domain Services, Part 3: Explore AD with user and computer accounts How do you begin working with Active Directory Domain Services (AD DS)? If you have read...
M365 Manager Plus | April 25, 2022NOBELIUM's phishing attacks: How to protect your Microsoft 365 setup [E-book] In 2021, the Microsoft Threat Intelligence Center discovered a new malicious email...
M365 Manager Plus | April 12, 2022Protecting your Microsoft 365 services against NOBELIUM attacks [E-book] In December 2020, Microsoft came forward with details regarding what is now being...
Identity and access management | March 22, 2022A practical approach to Active Directory Domain Services, Part 2: Active Directory and the Domain Name System For readers who have returned to this blog after understanding the basics of Active...
Identity and access management | March 15, 2022A practical approach to Active Directory Domain Services, Part 1: A beginner's guide to Active Directory Active Directory Domain Services (AD DS) is the traditional, on-premises domain service...
DataSecurity Plus | February 24, 2022Is your sensitive data overexposed? 76% of IT security leaders experienced data breaches involving the loss or theft of...
ADManager Plus | February 15, 2022Step into the new year with organized and secure IAM According to Business Insider, 80% of people give up on their new year resolutions within...
AD360 | December 14, 2021The human element in cybersecurity According to IBM's Cost of a Data Breach Report 2021, the global average cost of a data...
AD360 | December 13, 2021Implementing endpoint and network security for a hybrid workforce model The onslaught of the COVID-19 pandemic brought about many changes and disruptions in...
AD360 | December 9, 2021Developing a risk-based approach to cybersecurity in the hybrid workforce model The hybrid workforce model is a novel workplace trend that provides employees the freedom...
AD360 | December 8, 2021Reinventing cybersecurity with a multi-layered approach The complexity of cybersecurity threats has increased over the years. Additionally, the...
Identity and access management | December 6, 2021Key trends from 2021 that redefined IAM With 2022 around the corner, many want to hit the ground running and make the new year...