Avoid what is Strong and Strike at what is Weak
Despite Firms’ Best Efforts, Security Vulnerabilities Are Increasing From the infamous Sony hack and other high-profile data breaches to Heartbleed, Shellshock and the new wave of mass mobile threats, 2014 was an historic (if woeful) year for cybersecurity. As a...
PLANNING FOR Microsoft 365 GAPS Don’t Hope for Cyber Resilience … Plan for It
There is a major shift happening in the world of enterprise IT systems. Many organizations are trading on-premises systems for cloud-based solutions, a move that brings virtually limitless scalability, storage and accessibility – usually at a lower cost and with...
How cybercriminals are using Microsoft to launch phishing attacks
Attackers are creating phishing sites from Sway, an effective approach as links for the domain are typically trusted. You may not be familiar with Microsoft Sway or at least have never used it. But cybercriminals have been exploiting this web app to send phishing...
Information Security: Your People, Your First Line of Defense
A company can put together as many technology solutions or policies as it likes, but, in the end, its people are the most important element in information security. If the employees in your organization don’t feel personally invested in improving your organization’s...







