Security Posts

Explore related posts tagged with "Security"

Intune for Mobile Device Management Demo (Video)

Intune for Mobile Device Management Demo (Video)

Intune for Mobile Device Management (MDM) and Mobile Application Management (MAM). Using Microsoft's Intune for Mobile Device management is a easy way to enable your mobile workforce while still maintaining control of your...

Creating Compelling Security Training and Awareness Programs

Creating Compelling Security Training and Awareness Programs

People in IT know the importance of security training If employees dont know how to avoid crucial mistakes the result could be an expensive breach...

HipChat Users Should Migrate to Microsoft Teams

HipChat Users Should Migrate to Microsoft Teams

The new year brings a ton of new things new workflows new tech restructured business plans etc But one thing the new year isnt going to bring i...

Save Money in Azure by RightSizing Your Virtual Machines

Save Money in Azure by RightSizing Your Virtual Machines

Saving Money in AzureSaving money in Azure is as simple as getting rid of whitespace You pay for CPU underutilization in your virtual machines...

Cybersecurity Trends for 2019

Cybersecurity Trends for 2019

One thing is certain for the cybersecurity world in 2019 there will be lots of online attacks and a large part of it will use new techniques Some k...

What is Microsoft Copilot

Stopping Spoofing with DKIM and Exchange Online Protection

Stopping spoofing before it gets to your users becomes more important every day. Phishing is still the most common source of attacks, including malware, BEC scams, and ransomware. Providing defenses to stop spoofed and phishing emails t...

Biggest Tech Stories of 2018

Biggest Tech Stories of 2018

Handpicking the top tech stories of the year is no easy feat Each year techs rapid growth and industry swallowing behaviorsresult in a slew of he...

10 Things You Should Do to Ensure Physical Cybersecurity

10 Things You Should Do to Ensure Physical Cybersecurity

Its not just Santa coming through your chimney this holiday season If youre not careful unwanted guests may look to enter as well taking physical...

Pentesting Microsoft Office 365

Pentesting Microsoft Office 365

IT security is a game of cat and mouse Bad actors are continuously developing new methods for disrupting systems and CTOs CIOs and their teams are ...

How Military OpSec Improves Cyber Security Planning

How Military OpSec Improves Cyber Security Planning

Every organization has data and cyber security policies This is a nonnegotiable protection that companies rely on to maintain privacy over intellect...