Uncategorized

/Uncategorized

3 Password Policy Best Practice Solutions You Need Right Now

2019-08-26T12:58:21-04:00

14 Characters Are No Longer Enough Microsoft has been building productivity platforms that have powered the world for decades. With more than 180 million users, Office 365 continues to grow — particularly as support for on-premises servers and other technology and a greater emphasis on Cloud-based services. While impressive, this growth has naturally made their platforms the natural target for cybercriminals. And because so many organizations rely on Office 365 and other Microsoft services as part of their technological infrastructure, this naturally makes those organizations at risk of breaches and other cybersecurity issues. Currently, Windows’ minimum password character length is around [...]

3 Password Policy Best Practice Solutions You Need Right Now2019-08-26T12:58:21-04:00

It’s Time to Be Proactive with IT Security Administration

2019-08-26T12:53:48-04:00

All too often, it can be easy for organizations to build a set of identity-based security processes and procedures only to then walk away once the work is done. Sure, you’ll be monitoring things and making adjustments here and there, but the effort is primarily reactionary. There are no forward-thinking or proactive steps taken to ensure those processes and procedures are followed consistently and evaluated on an ongoing basis. One reason is the misperception that there is a lack of ROI on cybersecurity measures. According to cybersecurity expert Troy Hunt, the potential fines for cybersecurity failures — such as those under [...]

It’s Time to Be Proactive with IT Security Administration2019-08-26T12:53:48-04:00

Identity-Based Security: Best Practices for Protecting Your Users and Customers

2019-08-26T12:51:38-04:00

Is Identity-Based Security Hopeless? We all know it’s important to keep both consumer and business data safe. We’re instructed to uphold certain identity-based security procedures to keep ourselves and others safe. These include creating complex passwords — both for professional and personal accounts — and following certain device login and authentication procedures in the workplace according to our IT, legal, and compliance departments’ policies.  Despite this, 81 percent of breaches use stolen or weak credentials. How can this be when there’s so much emphasis on cybersecurity and the processes around it? It seems that despite companies’ best efforts to keep security [...]

Identity-Based Security: Best Practices for Protecting Your Users and Customers2019-08-26T12:51:38-04:00

How You Can Protect Your Company After a Ransomware Attack

2019-06-04T15:12:05-04:00

Ransomware attacks can be crippling to an organization and put vital information, confidential data, reputations and even lives at risk. The bigger the impact of a potential attack, the more appealing it is to a hacker because they can demand more of a ransom to release the data. Good preparation is the best way to lessen the impact of a potential ransomware attack. Protecting data through endpoint security, diversifying your storage solutions and educating your team are great steps to take to help reduce risk and keep data safe. But no matter how much you prepare, there’s still the chance that [...]

How You Can Protect Your Company After a Ransomware Attack2019-06-04T15:12:05-04:00

Why Vendor Management Questionnaires Need to Be More Efficient

2019-07-12T11:49:22-04:00

More Data, More Regulations, More Challenges Each day across the world, organizations are relying on one another for professional services and support in multiple areas. Sometimes, it’s because current staffing can’t support the demands being placed on them. Other times, it’s because internal solutions don’t exist and would be too costly to build. Or it’s just a matter of convenience. Whatever the reason, companies enter into arrangements with one another for a variety of needs. While not all companies require a contract or an extensive discovery session, many B2B services will — especially when it comes to companies that will be [...]

Why Vendor Management Questionnaires Need to Be More Efficient2019-07-12T11:49:22-04:00