Tag: Two factor authentication
September 16, 2016 |
2 Rules to Secure Office 365 Password Policy Setup
Password policy in Office 365 is much stricter and more secure than that of an on-premises application, so you no longer have to worry about setting and enforcing different authentication policies for your users. But still, you should align Office365 security settings with your overall enterprise...
April 20, 2016 |
4 Rules to Enhance Email Security in the Cloud
The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
December 28, 2015 |
What To Do about Passwords in Your Disaster Recovery Plan
One post thread on Spiceworks caught my eye. The Spicehead wanted to know what to do about passwords when it came to DR plans. Was he supposed to put the passwords into it, or just what was he supposed to do with them. Well, the first thing you don’t want to do is put them in the Disaster...
November 19, 2015 |
The Importance of Two Factor Authentication in Information Security
Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel confident of it or sleep soundly at night thinking that everything is secure, they will likely...
February 4, 2015 |
Stopping Skeleton Key Malware from Causing Data Breaches
Proving the old adage that “criminals never sleep,” a new piece of malware is making headlines. The aptly named Skeleton Key malware, detected in mid-January, bypasses the password authentication protection of Active Directory. Just as skeleton keys from the last century unlocked any door in a...