There is no excerpt because this is a protected post.
Require Password Rules and Enforce Them Strong passwords are one of the first lines of defense against breaches and changing them occasionally may help keep hackers out. But most staff will not voluntarily update their passwords, even when prompted. Make regular password updates mandatory and teach users how to create and remember strong passwords. Update
Ransomware is a cyber threat that is only increasing in prevalence. Ransomware is an attack on data that will restrict the ability for a business to access that data. The attacker will hold your data for a “ransom”, often payable with Bitcoin. However, paying the attacker should be a last resort. Contacting the FBI should
Does your company monitor and control mobile access to shared systems like MS Sharepoint, Teams, and other types of cloud sharing platforms? Are you controlling the ability to share your information externally from these portals? MS Sharepoint, Teams and other types of cloud sharing platforms have mobile access capabilities. These portals can be controlled through
How many times have you downloaded an app, and during the install process, it asks you for access to contacts, calendars, and other hardware like your camera? Did you stop and ask yourself, why does an app need access to my camera and do I need to give it the permissions? For some apps, it
In today’s IT System Administration Environment, where a user or IT professional is given an administrative account to manage services, application installs, and server management, a single source of access across all these functions can lead to disastrous results in the event of a breach. If there is only one admin account that manages your
What you know, what you have, and who you are; These are three types of authentication. What you know, your password. What you have, a mobile device with a code through an authenticator app. And who you are, biometrics. So why use it and how do I do so? Access to shared file storage platforms
In our Blog Email Instincts: Phishing Ploys, we mentioned links that are malicious by redirecting you to a different website than the one you believed you were visiting, like the office.com website. The real ploy is to get you lured into the belief that you need to change or update your password through an email