Security and Compliance

Explore related topics in this category

Creating Compelling Security Training and Awareness Programs

Creating Compelling Security Training and Awareness Programs

People in IT know the importance of security training If employees dont know how to avoid crucial mistakes the result could be an expensive breach...

Cybersecurity Trends for 2019

Cybersecurity Trends for 2019

One thing is certain for the cybersecurity world in 2019 there will be lots of online attacks and a large part of it will use new techniques Some k...

What is Microsoft Copilot

Stopping Spoofing with DKIM and Exchange Online Protection

Stopping spoofing before it gets to your users becomes more important every day. Phishing is still the most common source of attacks, including malware, BEC scams, and ransomware. Providing defenses to stop spoofed and phishing emails t...

Best Tech Talks of 2018 (Video)

Best Tech Talks of 2018 (Video)

The Best Tech Talks of 2018When we decided to reformat our Tech Talks engineering office hours back in June we had no idea what to expect W...

10 Things You Should Do to Ensure Physical Cybersecurity

10 Things You Should Do to Ensure Physical Cybersecurity

Its not just Santa coming through your chimney this holiday season If youre not careful unwanted guests may look to enter as well taking physical...

Managing Microsoft Secure Score (Video)

Managing Microsoft Secure Score (Video)

Managing Microsoft Secure Score VideoManaging Microsoft Secure Score is a simple transparent way to manage the security of your Office 365 W...

Kali Linux in Microsoft Azure (Video)

Kali Linux in Microsoft Azure (Video)

Kali Linux in Microsoft Azure VideoKali Linux is one of the most versatile and highly regarded pentesting platforms available The suite of ov...

Pentesting Microsoft Office 365

Pentesting Microsoft Office 365

IT security is a game of cat and mouse Bad actors are continuously developing new methods for disrupting systems and CTOs CIOs and their teams are ...

When MFA Fails - How to Manage a Break Glass Procedure

When MFA Fails - How to Manage a Break Glass Procedure

WHAT IS A BREAK GLASS PROCEDUREYouve probably spotted breakglass points or boxes in a building Usually smashing the glass allows quick acc...

Guide to Office 365 Litigation Hold Process

Guide to Office 365 Litigation Hold Process

The business world is constantly chasing compliance With an everevolving litigation system and an increasing number of regulatory bodies prepared t...