Blog

Email Security

Email is not secure. It has never been secure, and little has changed since its invention by Ray Tomlinson back in 1971.   Fast forward to 2022 and most business leaders and end users are aware of the risks of email phishing. Most also know that it is a primary way...

Rethink your Microsoft 365 and AD password policy

Malicious hackers have an enormous trove of common passwords they can use to try and access your network. These lists demonstrate how weak common password choices tend to be. Some common examples of passwords highlight how important a password policy can be:...

Microsoft 365 and shared user accounts

Shared user accounts are often adopted in situations where a business may have multiple people who need access to the same resources on their network. This happens in situations for example, with roles like reception or with maintenance personnel. All these employees...

How to prevent a data breach

It has never been easier to share and collaborate with co-workers on data than now. Saying that, let’s be sure we protect our sensitive company information against the threats that cloud-based computing accelerates. Historically, you may have had an internal policy...

The rogue IT Admin

74% of data breaches involved privileged credential abuse.  Centrify Who has access to private data at your business? What policies do you have in place to ensure that your internal IT department is accountable? When it comes to user access, every organization needs...