Cloud and Data Security Microsoft 365Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and BeyondMulti-factor Authentication (MFA) combines what the user knows (password), with what the user has (security token) and what the user is (biometric verification) to ensure user identity. Learn why this …Read in 4 minutes
Cloud and Data SecurityXML External Entity (XXE) Attacks — Web-based Application Security, Part 5XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they …Read in 3 minutes
Cloud Technology Google Workspace Microsoft 365Migrating from Microsoft 365 to Google Workspace: Tips to RememberMigrating from one platform to another, particularly one that forms the bedrock of an organization, can be extremely stressful and sub-optimal if not carefully charted. Here are some pointers to lay …Read in 4 minutes
Cloud and Data SecurityCIA Triad: Best Practices for Securing Your OrgThe CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the …Read in 3 minutes
Backup Cloud and Data SecurityForming a Backup Strategy: 4 Steps to FollowA comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow these four …Read in 4 minutes
Cloud and Data SecurityStegware aka Steganography Malware – Malware of the Month, July 2019Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware’s relatively easy implementation and …Read in 3 minutes
Cloud and Data SecuritySQL Injection Attacks (SQLi) — Web-based Application Security, Part 4SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that …Read in 4 minutes
Cloud and Data Security Microsoft 3656-Point Microsoft 365 Post-Migration ChecklistPlan for your post-migration with the same enthusiasm as your Microsoft 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist.Read in 3 minutes
Cloud and Data Security Microsoft 3655 Guidelines for a Successful Microsoft 365 MigrationWhen moving to the cloud, security and compliance are among the top concerns for many organizations. Following these 5 guidelines will help to ensure a smooth transition to Microsoft 365 and establish …Read in 4 minutes