Category: Threat

0

Webinar Series Update: Evading Anti-Virus

In the webinar I gave last week based on “How attackers break in“, there were several questions at the end that focused on password management and then also evading anti-virus. During the webinar, I...

0

Panel discussion: Cyber-security in SharePoint and Office 365

Microsoft’s Office 365 and Azure platforms are among the fastest growing cloud environments on the market, and yet even with record-setting growth, cyber-security remains the top concern of organizations considering moving all or part...

0

Webinar Series: How your IT environment can be compromised

Join me and Netwrix in this practical webinar series about cyber-security. These three webinars walk you through the hacking process, some techniques hackers use once inside your network, and the tools and techniques you...

0

Where is Liam?

It is that time of year where everyone starts to get busy, the weather changes, and people tend to be much happier all around. We have normally got through the winter time and the...

0

Using Risk-based Multi-Factor Authentication – Reporting

In the last post: Using Risk-based Multi-Factor Authentication, I talked about setting up the risk-based policies, in this post we will look at the reporting and alerting mechanisms that are available. Within the Azure...

0

Using Azure Information Protection to help with General Data Protection Regulations (GDPR) Compliance

‘Azure Information Protection‘ is a cloud-based solution that helps an organization to classify, label, and protect its documents and emails. This can be done automatically by administrators who define rules and conditions, manually by...

0

How secure is #Office365 against cyber-threats?

How secure is Office 365 against cyber-threats? One of the questions I get asked frequently is this. Even with Microsoft providing documentation, guidance and speaking at conference saying how secure it is, we still...