Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

Is Microsoft Office 365 HIPAA Compliant?

No. That’s the answer in their FAQ. Out-of-the-box Office 365 is not HIPAA compliant, and you need to take the appropriate steps to ensure your organization stays compliant. As the...

Read More

Malware Protection: Basics and Best Practices

Malware is simply a piece of code that attempts to hide and perform a predetermined set of actions to gain access to sensitive data or cause disruption in the operations...

Read More

Top 5 Remote Work Security Threats

Suddenly cybersecurity teams have to adjust to the reality of a nearly 100% remote workforce. Security best practices often take a back seat to business continuity in strange times like...

Read More

PowerShell Array Guide: How to Use and Create

Arrays are a fundamental feature of PowerShell. Arrays make it possible to ingest, manipulate and output true data structures (and not just raw strings). This capability makes PowerShell different and...

Read More

How To Prevent Ransomware: The Basics

According to the 2019 Verizon Data Breach Report, ransomware is the 2nd most frequent malware attack behind command & control (C2) attacks.  Email is still the top delivery mechanism for...

Read More

How to Run an Active Directory Audit Using Varonis

Active Directory (AD) holds the keys to the kingdom, and attackers know all the tricks to take advantage of vulnerabilities in AD to stay hidden and move around the network...

Read More

What is an IT Security Audit? The Basics

A security audit is the high-level description of the many ways organizations can test and assess their overall security posture, including cybersecurity. You might employ more than one type of...

Read More

How to Use Microsoft Teams Safely: Security and Compliance Basics

Microsoft Teams is the lynchpin in the Office 365 portfolio. It brings all the other products together, gets users collaborating, and opens several lines of communication all from a single...

Read More

Data Privacy Guide: Definitions, Explanations and Legislation

Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns...

Read More

What is UEBA? Complete Guide to User and Entity Behavior Analytics

UEBA can either stand for “User and Event Behavior Analytics” or “User and Entity Behavior Analytics.” It extends on an early type of cybersecurity practice – User Behavior Analytics, or...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.