Security and Compliance

Explore related topics in this category

CISA Security Recommendations for Office 365

CISA Security Recommendations for Office 365

The Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency CISA has released an alert as an update to its May 2019 Analy...

Compliance in GCC High, GCC and Microsoft 365 Commercial

Compliance in GCC High, GCC and Microsoft 365 Commercial

Simply having GCC High GCC or Azure Government does not meet any compliance framework all by itself This should go without saying but NO platform ...

Empowering Remote Workforce with Windows Virtual Desktop

Empowering Remote Workforce with Windows Virtual Desktop

In October only about52targetblank relnoopener noreferrerof the nations office workforce was working from home This number was slowl...

Securing the Remote Workforce

Securing the Remote Workforce

In todays professional environment its never been more important to have a secure remote workforce There was a time when working remotely remained...

How Social Engineering Hacks Are Caught With Network Security

How Social Engineering Hacks Are Caught With Network Security

Social engineering is by far the most insidious type of hack to ever be used against a business The worst part is that hackers arent even pitting th...

Zero Trust Security to Protect Remote Workforces During COVID-19

Zero Trust Security to Protect Remote Workforces During COVID-19

What is Zero Trust Security ZTSZero Trust Security was still considered a buzz word when we first wrote about over a year agonewsplannin...

Microsoft Teams for Heathcare Demo [Video]

Microsoft Teams for Heathcare Demo [Video]

Microsoft teams is a valuable tool in any organization, but once you start looking at specific use cases, you start to see the real power behind the platform...

10 Free Security Resources for Remote Work

10 Free Security Resources for Remote Work

When you consider all the online threats out there (with phishing, Shadow IT, APTs, ransomware, and cryptominers, to name just a few), you must ensure you are employing necessary and effective tools capable of protecting....

Data Governance for Healthcare

Data Governance for Healthcare

In so many industries cloud computing has revolutionized the way we store files and work in the digital space Its not just convenient it also help...

Understanding Active Directory - All Seven Types (Video)

Understanding Active Directory - All Seven Types (Video)

In this Tech Talk Conrad Agramont Agile IT CEO discusses the seven types of Active Directory what to use them for and how they can be used togeth...