Five worthy reads: Privacy in pandemic management

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the data privacy challenges and concerns that have... Read more »
IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise,... Read more »
IT security: PowerShell as a cyberattack tool

IT security: PowerShell as a cyberattack tool

Tools and features introduced with the intention of benefiting and empowering an organization can sometimes end up being misused. PowerShell is a classic example. PowerShell is a more powerful command-line interface that... Read more »

Why litigation holds are not a viable alternative to backups

Microsoft does not provide backup and recovery tools for its Office 365 services and has no plans to include them in the future. Some organizations use litigation holds as a substitute for... Read more »