Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

PowerShell Remoting: Cheat Sheet and Guide

Windows PowerShell 2.0 made a powerful new technology available for system administrators: remoting. Remoting has increased in importance in each PowerShell iteration since then, and future Microsoft products will rely...

Read More

The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA

Ensuring that your Azure cloud service is compliant with the regulations that cover customer data can be complex. Each set of regulations – HIPAA, PCI, GDPR, and the CCPA –...

Read More

Is Microsoft Office 365 HIPAA Compliant?

No. That’s the answer in their FAQ. Out-of-the-box Office 365 is not HIPAA compliant, and you need to take the appropriate steps to ensure your organization stays compliant. As the...

Read More

Malware Protection: Basics and Best Practices

Malware is simply a piece of code that attempts to hide and perform a predetermined set of actions to gain access to sensitive data or cause disruption in the operations...

Read More

Top 5 Remote Work Security Threats

Suddenly cybersecurity teams have to adjust to the reality of a nearly 100% remote workforce. Security best practices often take a back seat to business continuity in strange times like...

Read More

How to Connect to Office 365 PowerShell: Azure AD Modules

Office 365 PowerShell is a powerful tool that lets you manage your Office 365 settings straight from the command line. After connecting Office 365 PowerShell to your Office 365 organization,...

Read More

What is HIPAA Compliance? Your 2020 Guide + Checklist

HIPAA fines cost ten companies $28.7 million in 2018, which broke the previous 2016 record for HIPAA fines by 22%! That’s only 10 HIPAA cases resolved out of 25,912 complaints...

Read More

PowerShell Array Guide: How to Use and Create

Arrays are a fundamental feature of PowerShell. Arrays make it possible to ingest, manipulate and output true data structures (and not just raw strings). This capability makes PowerShell different and...

Read More

13 Must-Know Office 365 PowerShell Commands

Using PowerShell to manage Office 365 can make your work faster, more efficient, and easier. PowerShell gives you access to information about your Office 365 environment that you can’t access...

Read More

How To Prevent Ransomware: The Basics

According to the 2019 Verizon Data Breach Report, ransomware is the 2nd most frequent malware attack behind command & control (C2) attacks.  Email is still the top delivery mechanism for...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.