Category: Identity

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...

0

Where is Liam?

It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We have normally got through the winter time and the...

0

Using Risk-based Multi-Factor Authentication – Reporting

In the last post: Using Risk-based Multi-Factor Authentication, I talked about setting up the risk-based policies, in this post we will look at the reporting and alerting mechanisms that are available. Within the Azure...

4

Using Risk-based Multi-Factor Authentication in Microsoft 365

One of the best Security protections that can be used with accounts, is Multi-Factor Authentication. However, the problem arises trying to get the balance between Security and User Experience. You know what I mean,...

0

How secure is #Office365 against cyber-threats?

How secure is Office 365 against cyber-threats? One of the questions I get asked frequently is this. Even with Microsoft providing documentation, guidance and speaking at conference saying how secure it is, we still...

0

Understanding Privileged Access Workstations (PAWs)

For some of the work I do, there is often a need to have a secure workstation that will let me perform tasks for Administration only, and not be vulnerable to any type of...

0

Great Infographic from Microsoft

Cyber-attacks are getting more sophisticated—often using social engineering, zero-day vulnerabilities, and even misconfiguration to break into corporate networks. Thousands of such attacks were reported in 2015 alone. With Windows 10, you can help safeguard...

0

Infographic: Stop Hackers

Ever so often I like to post Info-graphics that I think are useful to not just me but to others too. This one is courtesy of http://privacypolicies.com “Hackers will often try to glean information...

2

Attacking the SharePoint Server from the Inside – Part 1

So over the past year or so I have spent time talking and writing about “Hacking SharePoint“, and of course “Protecting SharePoint” A series of blog posts can be found here below: https://www.helloitsliam.com/2014/11/07/is-your-sharepoint-secure-what-can-the-hackers-really-get/ https://www.helloitsliam.com/2014/11/07/is-your-sharepoint-secure-what-can-the-hackers-really-get-part-2/...