Articles by
Jeff Petters

Jeff has been working on computers since his Dad brought home an IBM PC 8086 with dual disk drives. Researching and writing about data security is his dream job.
3 Tips to Monitor and Secure Exchange Online
Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...
Complete Guide to Windows File System Auditing
Windows file system auditing is an important tool to keep in your cybersecurity forensics toolbox. Read on to learn more about file system auditing on Windows, and why you will...
What is Privileged Access Management (PAM)?
When a breach happens, the first question people ask is, “What did the company do wrong?” The short answer is – it depends. However, we do know one mistake many...
Active Directory Security Best Practices
Active Directory security is important because Active Directory(AD) represents the keys to the kingdom. Imagine that box where your store all of the physical keys to every door in the...
Office 365 Migration: Enterprise Guide and Best Practices
Moving your company’s data to cloud-based storage is a big job, and we want to make sure you understand what it takes to ensure that your Office 365 data is...