Category: Operating Systems

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...

0

Where is Liam?

It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We have normally got through the winter time and the...

1

What does GDPR mean for you and Office 365

By now you will have heard about the new General Data Protection Regulation (GDPR) that will be coming into effect shortly. This was started by the European Commission in 2012 and finally generally agreed...

0

Understanding Privileged Access Workstations (PAWs)

For some of the work I do, there is often a need to have a secure workstation that will let me perform tasks for Administration only, and not be vulnerable to any type of...

0

New course @Pluralsight

Today my course that I have been working on for the past few months is now live. The course is called “SharePoint Security End-to-End“. The premise of the course is the need to make...

0

Great Infographic from Microsoft

Cyber-attacks are getting more sophisticated—often using social engineering, zero-day vulnerabilities, and even misconfiguration to break into corporate networks. Thousands of such attacks were reported in 2015 alone. With Windows 10, you can help safeguard...