Leverage the full ease and security of Azure Information Protection

Azure Information Protection

Leverage the full ease and security of Azure Information Protection Keeping all your company’s data labeled according to policy with full visibility and control into how that data can be used is a daunting task. However, with Azure Information Protection, administrators have easy access to labeling, classifying and action controls,… Read more »

Can you comply? Here are the top 10 areas for compliance in Microsoft 365

Microsoft’s Top 10 Areas of Compliance

Can you comply? Here are the top 10 areas for compliance in Microsoft 365 Microsoft 365 has a multitude of features to help you navigate your industry’s compliance standards, along with federal and global regulatory compliance requirements.  Compliance is among the toughest challenges for businesses in the digital age. Aside… Read more »

What’s this GDPR thing about and why does it matter to me?

Microsoft 365 GDPR Compliance

What’s this GDPR thing about and why does it matter to me? Be prepared for this required, global regulatory compliance mandate by enabling Microsoft 365 compliance controls.  How companies across the globe approach data security and compliance is about to shift dramatically this upcoming May, and chances are your company… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Secure your Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility +… Read more »

Microsoft 365: Empowering Businesses with Comprehensive Security

Microsoft 365 Security

Microsoft 365: Empowering Businesses with Comprehensive Security The news is riddled with headlines of increasingly more enterprises being compromised by data breaches. This causes business owners across the globe to be alarmed of the security of their own company’s data. In fact, a security portal that collects cybersecurity data reported that there were 1,061… Read more »

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Have I been Breached? 4 Signs to know when your Business is under Attack

have i been breached

Have I been Breached? 4 Signs to know when your Business is under Attack There is one major difference between how cyber security experts and everyone else think about cyber security: our expectations. While most people don’t assume there is an issue until one is presented to them, security experts… Read more »

The Cloud Security Landscape

cloud security landscape

The Cloud Security Landscape At this point, you’ve definitely heard of the cloud. Everyone, especially businesses, is talking about moving to the cloud, and their concerns about the cloud security landscape. You already use cloud-based services such as Netflix, Spotify, and Amazon. However, like with most technologies, innovation precedes security,… Read more »

Drafting Cyber Security Policy for your Company

cyber security policy

Drafting Cyber Security Policy for your Company The aspects you need to cover when drafting or updating your company’s cyber security policy- from employee responsibilities to federal compliance policies. Drafting cyber security policy for your company can seem an overwhelming task. There is so much to cover and it all… Read more »

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »