According to the study “On the Pulse” by Stroz Friedberg, around 87% percent of senior managers have admitted to sending corporate data to personal cloud storage and email, and as noted in an article by HPIAA Secure Now, around 58% percent of employees have accidentally sent information to the wrong person. Continue reading Windows Information Protection (WIP)
Microsoft SQL Database is a high-performance, reliable, and secure database environment you can use to build data-driven applications and websites in the programming language of your choice, without needing to manage infrastructure.
Azure SQL is a fully managed, relational Database-as-a-Service (DBaaS) in the Microsoft cloud (Azure). A Platform-as-a-Service (PaaS) offering, SQL Database delivers predictable performance, scalability with no downtime, business continuity, and data protection. Continue reading What is Azure SQL Database service?
IT asset management (also called IT inventory management) is an important part of an organization’s strategy. It usually involves gathering detailed hardware and software inventory information which is then used to make decisions about hardware and software purchases and redistribution. Continue reading Best Practices for IT Asset Management
When data is shared with a third-party vendor, keeping it secure can become a colossal effort. It’s not easy for businesses to protect customer data these days, particularly when they share it with their business or technology partners. Yes, we are talking about another data breach headline which affected millions of customer accounts at Verizon. Continue reading Cloud Leak: Verizon Data Breach Affects Millions of Customer Accounts
Before we learn about PAW security model, lets first understand what PAW is?
PAW (Privileged Access Workstations) is a mechanism that is used to help administrators or IT security officers to avoid the exposure of privileged credentials by attackers or criminals from your network. Continue reading Microsoft Privileged Access Workstation ‘PAW’ Security Model
A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain. Continue reading Prevent Infection from Petya/NonPetya Ransomware Using a Single File
The idea of working nights is not a new one. It goes far back in history, as far back as the gatekeepers of ancient kingdoms that guarded the grounds at night. Their job was protecting their master from any threat. It wasn’t until the late 1800s that the concept of night shift changed. The invention of the light bulb allowed workers to work longer by illuminating the dark. Manufacturers in metal and textile mills jumped at the chance for increased production and higher profits. They introduced the concept of shift work. This meant they could split crews into groups and work around the clock. This allowed the production of more goods without the added pay of extra crew. Continue reading Tips to help you adjust to working the night shift
Azure Information Protection is a cloud-based solution that helps your business classify, label, and protect its documents and emails. This can be set automatically by the administrators based on defined rules and conditions, or manually by users, or a combination with recommended suggestions. Continue reading What is Azure Information Protection?
We have all heard this adage of encouraging teamwork, but what does “working together” really do for you?
Although difficult to nurture, since humans are essentially self-centered, which tends to create friction naturally, it can be overcome using the organization goals as an objective to be shared across through clear communication and by setting up SMART Goals aligning the team to work together, and finally establishing a healthy working environment. Continue reading Two Heads Are Better Than One
Huge cyber-attack leveraging hacking tools widely believed to have brought disruption to Britain’s National Health System (NHS) on May 12th, 2017 and infected 99 other countries around the world. Continue reading Ransomware Awareness: WanaCrypt0r 2.0