Some of today’s most popular and useful information-sharing platforms can leave a lot to be desired from a security standpoint. Here are some of the issues and how to mitigate them.
Partitioning decisions in Windows were once mundane with little risk attached. Recent vulnerabilities that allow the bypassing of safety protocols highlight the need to pay more attention to them.
While it may be tempting to adopt new Microsoft Windows network protection tactics, methods, and software, a better approach is to review and refine what’s already in place.
Hardware still running on Windows 10 has received an official three-year reprieve. It’s an great opportunity to review aging assets and projects.
Examining what went wrong with SolarWinds’ handling of cyberattack reporting provides a cautionary tale for aspiring and incumbent security leaders alike.
After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem.
Gone are the days when a protected OS kept the bad guys out. Hardening authentication, the help desk, and log files in place is now needed to beat the bad guys.
Phishing is getting more and more difficult for spam filters to defend against, but for those using Microsoft 365, user education and built-in processes can help you fight back.