Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

3 Tips to Monitor and Secure Exchange Online

Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...

Read More

Complete Guide to Windows File System Auditing

Windows file system auditing is an important tool to keep in your cybersecurity forensics toolbox.  Read on to learn more about file system auditing on Windows, and why you will...

Read More

What is Privileged Access Management (PAM)?

When a breach happens, the first question people ask is, “What did the company do wrong?” The short answer is – it depends. However, we do know one mistake many...

Read More

Active Directory Security Best Practices

Active Directory security is important because Active Directory(AD) represents the keys to the kingdom. Imagine that box where your store all of the physical keys to every door in the...

Read More

Office 365 Migration: Enterprise Guide and Best Practices

Moving your company’s data to cloud-based storage is a big job, and we want to make sure you understand what it takes to ensure that your Office 365 data is...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.