Cloud and Data SecurityCIA Triad: Best Practices for Securing Your OrgThe CIA Triad, or Confidentiality-Integrity-Availability, is a flexible model that can be applied to help secure your organization’s information systems, applications, and network. Learn about the …Read in 3 minutes
Backup Cloud and Data SecurityForming a Backup Strategy: 4 Steps to FollowA comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow these four …Read in 4 minutes
Cloud and Data SecurityStegware aka Steganography Malware – Malware of the Month, July 2019Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware’s relatively easy implementation and …Read in 3 minutes
Cloud and Data SecuritySQL Injection Attacks (SQLi) — Web-based Application Security, Part 4SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that …Read in 4 minutes
Cloud and Data Security Microsoft 3656-Point Microsoft 365 Post-Migration ChecklistPlan for your post-migration with the same enthusiasm as your Microsoft 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist.Read in 3 minutes
Cloud and Data Security Microsoft 3655 Guidelines for a Successful Microsoft 365 MigrationWhen moving to the cloud, security and compliance are among the top concerns for many organizations. Following these 5 guidelines will help to ensure a smooth transition to Microsoft 365 and establish …Read in 4 minutes
Cloud and Data SecurityInvisible aka Fileless Malware — Malware of the Month, June 2019Invisible malware is a type of Fileless malware that comes with zero footprint and is responsible for an increasing number of endpoint or zero-day attacks. It typically resides in memory, comes …Read in 2 minutes
Cloud and Data SecurityCross-Site Scripting (XSS) — Web-based Application Security, Part 3Cross-site scripting (XSS) is a technique in which malicious scripts are stored on and unknowingly retrieved from trusted websites by unsuspecting victims. Learn how to safeguard against this threat …Read in 4 minutes
Cloud and Data Security Compliance GDPRThe Year of GDPRThe EU General Data Protection Regulation (GDPR) came into effect on May 25, 2018. With nearly a year under its belt, Spanning takes a look at the major penalties & overall repercussions of GDPR …Read in 5 minutes