Archive for the ‘Data Security’ Category

Microsoft 365, formerly known as Office 365, is a popular cloud-based collaboration platform that allows companies to share information and applications with people outside of their network. Companies have the ability to share entire folders, including any subfolders. The open-sharing nature of Microsoft Office 365, specifically products like Teams, will inevitably increase the possibility of unauthorized exposure of sensitive data. To make matters worse, the default access controls provided by … Read more

Prior to the advent of the coronavirus pandemic, the term ‘zero trust’ was seen by many as just another industry buzzword that was thrown around until the next one came along. However, as employees across the globe were forced to work from home as a result of the imposed restrictions, companies were forced to adapt their security strategy to accommodate the ‘new normal’. The implementation of zero-trust is now being … Read more

In simple terms, a password spraying attack is where the attacker tries to “spray” commonly used passwords across an entire organization over a long period of time, in the hope that they can gain access to an account. Despite the fact that 81% of hacking-related breaches are password-related, many companies are still overlooking the importance of strong password security. There are many ways that cyber-criminals are able to exploit weak … Read more

Microsoft Exchange Server is a popular email server application that runs exclusively on the Windows Server operating system. In January 2021, a zero-day vulnerability was exploited by a state-sponsored group called HAFNIUM, who allegedly operate out of China. On the 16th of March, Microsoft published a set of tools, patches, and documents, designed to help security teams identify and remediate these vulnerabilities. The vulnerabilities that were identified allowed for remote … Read more

An Office 365 sensitivity label is essentially a type of tag which is applied to content that contains sensitive data, whether text documents, spreadsheets, or emails. Tagging sensitive content makes it a lot easier for security teams to keep track of where their data is located and how it is being accessed and shared. This in turn makes the data easier to protect. Sensitivity labels can also be used to … Read more

Google Workspace (formerly known as G Suite) is a cloud-based storage and collaboration platform, which provides all users with a Gmail account and a suite of apps, some of which include; Calendar, Docs, Sheets, Slides, Drive, Meet and Forms. What’s the Benefit of Google Workspace? Of course, anyone can get a Gmail account for free, as well as access to various Google applications such as Docs, Slides, and Sheets. So, … Read more

A phishing attack, which typically arrives in the form of an email, is where an adversary poses as a trusted entity in order to trick an unsuspecting victim into clicking on a link to a malicious website or downloading a malicious attachment. The goal of a phishing campaign is usually to obtain sensitive information, such as payment card details or user account credentials. Phishing attacks have become increasingly more targeted … Read more

Unless you’ve been living on the moon, you will have noticed that increasingly more employees are working remotely as a consequence of the ongoing pandemic. And, while many of those employees will likely return to the office in the wake of the crisis, a large number of them will probably continue as they are. According to Microsoft’s 2021 Work Trend Index, “over 70 percent of workers want flexible remote work … Read more

Google Workspace, formerly known as G Suite, is a productivity suite that includes a wide range of collaboration tools such as Gmail, Calendar, Meet, Chat, Drive, Docs, Sheets, Slides, Forms, Sites, and more. According to Statista, as of October 2020, Google Workspace holds approximately 60% of the market, with Microsoft’s Office 365 holding approximately 40% of the market. What Security Features Does Google Workspace Provides? When it comes to regulatory … Read more

In recent years we’ve seen a huge shift from on-premise to cloud-based environments, and with this shift came a number of security challenges – the most notable being that anyone could theoretically login to a privileged user account from practically anywhere in the world. This meant that organizations had to focus their attention on ensuring that the authentication methods they used were robust enough to prevent adversaries from compromising their … Read more