Cloud and Data Security Compliance Microsoft 365Why Granular SharePoint Backup and Recovery is ImportantSelective, granular SharePoint backup and recovery can help organizations to meet security standards, comply with industry regulations, and reduce liabilities. Learn why a blanket backup solution is …Read in 3 minutes
Cloud and Data SecurityDeepfake: The AI Endangering Your Cybersecurity How dangerous is deepfake to cybersecurity? The AI-based forgery is creating fear among businesses due to its growing popularity among cybercriminals.Read in 3 minutes
Cloud and Data SecurityZeus Virus AKA Zbot – Malware of the Month, November 2019The Zeus Virus, or Zbot, is a crafty and undetectable strain of malware that has been rather resilient and shown a strong ability to evolve since its first detection in 2007. For that reason, it’s our …Read in 3 minutes
Cloud Technology Microsoft 365Site Swap: Revamping Your SharePoint SitesSharePoint’s Site Swap command lets you easily convert a classic root site to a modern SharePoint site. Here is a walkthrough of how you can use Site Swap to get a revamped SharePoint site, as well as …Read in 3 minutes
Cloud and Data SecurityIdentity Theft on the Dark Web: Understanding the Full Impact of a Data BreachThe dark web has made identity theft a “lucrative business” which is leading to more pervasive and ingenious attacks – often targeting your customer’s credentials. Learn how to protect your data, …Read in 4 minutes
Cloud and Data SecurityKovter – Malware of the Month, October 2019Kovter — a malware that has evolved from a trojan-based ransomware to a click fraud malware and then to a fileless one — is Spanning’s Malware of the Month for October 2019. Learn how Kovter works and …Read in 3 minutes
Cloud and Data Security Microsoft 365Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and BeyondMulti-factor Authentication (MFA) combines what the user knows (password), with what the user has (security token) and what the user is (biometric verification) to ensure user identity. Learn why this …Read in 4 minutes
Cloud and Data SecurityXML External Entity (XXE) Attacks — Web-based Application Security, Part 5XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they …Read in 3 minutes
Cloud Technology Google Workspace Microsoft 365Migrating from Microsoft 365 to Google Workspace: Tips to RememberMigrating from one platform to another, particularly one that forms the bedrock of an organization, can be extremely stressful and sub-optimal if not carefully charted. Here are some pointers to lay …Read in 4 minutes