Lock down Outlook Web Access.
Posted by William Pate
January 28, 2020 12:45 AM
Topics: Email Management, Access Control, cybersecurity, Email Security, 31 Days of Law Firm Data Security
Hackers' methods continue to evolve. That means your security must evolve.
To adequately protect your firm, you need:
Topics: Security, Training, Malware, Information Governance, Email Management, Network, Access Control, Mimecast, Dual Factor Authentication, whaling, cybersecurity, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware, Hacking, Advanced Persistent Threats, phishing, Antivirus, Cybercrime, Enterprise Mobility Management, Mobile, Email Security, 2FA, Information Security, Penetration Testing, Vulnerability Testing, firewall
Posted by William Pate
August 23, 2016 1:20 PM
When you consider the best place(s) to store your data – in the cloud, on-premises in your office or some hybrid of the two – what questions do you ask?
Topics: Cloud, Data Backups, Cloud Storage, Disaster Recovery, Network, Access Control, cybersecurity, Cybercrime
Posted by Logan Byrd
March 1, 2016 9:55 AM
Let’s talk about passwords.
Most people’s idea of a good password is one which is easy to remember, and which meets the absolute minimum requirements of their business systems and IT policy. Over the years, between constant reminders from the information technology community and constant news reports about major security breaches, we have all begrudgingly accepted that our passwords need to be a little longer, a little more complex and a little more inconvenient for us to use.
The technology used by cybercriminals to crack passwords is always improving, however, and even a 52-character password made up of obscure words and phrases, such as “Ph'nglui mglw'nafh Cthulhu R'lyeh wgah'nagl fhtagn1.” can be brute-force cracked in an ever-shrinking amount of time.
Topics: Malware, Access Control, Dual Factor Authentication, cybersecurity, Hashcat, Passwords, Biometric Authentication, Two Factor Authentication, Ransomware
Posted by Kyle Worley
February 16, 2016 5:05 PM
When it comes to information security there is no silver bullet to stop attackers from infiltrating your firm. The “defense-in-depth” approach to information security is simple: add many layers of protection between yourself and the outside world. Hardening your computer is exactly what it sounds like, adding security measures to increase the difficulty of an attacker compromising your system. Below you will find a checklist of system hardening best practices, each of these are easy to implement and are critical in protecting your computer.
Topics: Security, Malware, Technology Consulting, Data Recovery, IT Tips, Disaster Recovery, Information Governance, Email Management, Access Control, SentinelOne
Comment on this post