Security and Compliance

Explore related topics in this category

Compliance in Microsoft Teams (VIDEO)

Compliance in Microsoft Teams (VIDEO)

Compliance in Microsoft Teams is built upon the same Office 365 services that have been verified across many international, industry and regional standards, and setting up compliance in Microsoft Teams is part of Office 365’s...

How Military OpSec Improves Cyber Security Planning

How Military OpSec Improves Cyber Security Planning

Every organization has data and cyber security policies This is a nonnegotiable protection that companies rely on to maintain privacy over intellect...

Setting up Single Sign-On (SSO) in Azure AD (VIDEO)

Setting up Single Sign-On (SSO) in Azure AD (VIDEO)

Setting up SSO in Azure Active DirectorySSO in Azure active directory is the perfect balance of convenience and security Enabling it remove...

The Spooky Thirteen Scariest Breaches and Hacks of 2018

The Spooky Thirteen Scariest Breaches and Hacks of 2018

Dont be afraid of cyber security The number of breaches and hacks in 2018 might seem scary but security tools are advancing almost as quickly as th...

Configuring Compliance Rules in Microsoft Teams

Configuring Compliance Rules in Microsoft Teams

Moving your data and applications to the cloud is one thing Maintaining compliance too is something else altogether and many SMBs and organizations ...

HIPAA Compliance in Microsoft 365

HIPAA Compliance in Microsoft 365

Businesses that deal in healthcare know the importance of HIPAA and HITECH compliance Violations of the privacy and security rules can result in larg...

Phishing Attack Simulator with Microsoft Security Center (VIDEO)

Phishing Attack Simulator with Microsoft Security Center (VIDEO)

Phishing attacks are the most common method of credential theft, with a low barrier to entry (You don't need to know much more than how to make a web page and write an email) and ever increasing sophistication. This morning, one of our ...

Zero Trust Security Part 2: Implementing with Microsoft 365

Zero Trust Security Part 2: Implementing with Microsoft 365

As explored in detail in Part 1 of this Zero Trust Security series the standard castle-and-moat, perimeter-styled network defense has been rendered practically useless in this new era of cloud computing, mobile devices, IoT, and other technologies...

A Guide to Planning Zero Trust Architectures - Part 1

A Guide to Planning Zero Trust Architectures - Part 1

The days of castleandmoat cybersecurity are over At least theyshouldbe over The old model is no longer cutting itnot even close Across the...

Computer Security In Co-Working Spaces

Computer Security In Co-Working Spaces

For the last decade the term coworking has become a standard phrase The reason for this standardization is the growth that the flexible office i...