
How to configure warning messages for Microsoft 365 emails from external senders
As a security precaution, it’s a good idea to remind your staff not to open attachments from unknown senders. One easy way to implement this
As a security precaution, it’s a good idea to remind your staff not to open attachments from unknown senders. One easy way to implement this
We would like to make you aware of a critical and widespread unauthenticated Remote Code Execution (RCE) vulnerability involving Apache’s Log4j Java logging library. Update – December 28th, 2021 (CVE-2021-44832) On December
International travel presents unique challenges to securing devices and information. This is particularly true when traveling to destinations that are considered to be high cyber risk countries such as
Executive Summary Business Email Compromise (BEC) is one of the most financially damaging cybercrimes. According to the Internet Crime Complaint Center (IC3), in 2020 the
Every day we see evidence of bad actors attacking various sized companies with ransomware. A commonly agreed upon defense mechanism that offers a good chance
On July 1st Microsoft issued a new advisory regarding the Windows Print Spooler Remote Code Execution vulnerability and has assigned it a new CVE: CVE-2021-34527
Intro Ransomware is on the rise, owing to the pandemic. In 2020, ransomware exceeded $1.4 billion in the US alone, according to an estimate from
Privileged and Service Account Management We spoke previously on the management of privileged accounts and how important it is to keep them accountable. Privileged accounts are one
Basic Privileged Account Management Abused and Misused privileges are often seen as being the cause of breaches within organizations around the world. Privileged account management