Blog

Security

Find here the articles and actionable information you need to simplify complex IT challenges.

How to remove weaknesses from your security posture to increase resilience

At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an Active Directory (or many Active Directories). Though many, including Microsoft, call AD a legacy application, the number of critical applications still using it is staggering. Last month at the Hybrid Identity Protection Global 2023 conference, the […] At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an  … At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an Active Directory (or many Active  … At the bottom of the cybersecurity stack, in most medium and large corporations around the world, there is an Active Directory (or many Active  …

Keeping Active Directory up and running all the time

As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous improvement lifecycle; design, transition, operate. In this blog post, I will discuss the service life cycle as it applies to Active Directory to help keep your environment running smoothly and to rapidly address service impacts. As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous  … As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous improvement lifecycle;  … As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous improvement lifecycle; design,  …

Strengthen your remote working defences against cyber-attacks

A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health Organization (WHO) has seen attacks rise by 100%2, and hospitals and research centres have been victims of ransomware3. With the majority of office-workers now accessing systems remotely, the risks for companies of […] A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1  … A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health  … A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health Organization  …

Remote working: Are you providing the required security?

In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from home. Without a doubt, this is the result of a cloud journey which started years ago, when Office 365 provided online versions of Word, Excel, Outlook and OneDrive, allowing people to […] In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees  … In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from  … In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from home.  …

The DEFINITIVE Corporate Data Security Checklist For Your Organization

In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach has risen 12% over the past five years[1] and now costs $3.92 million on average. This past year alone, over 2.3 billion records have been involuntarily leaked[2]! […] In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT  … In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach  … In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach has risen  …
Office 365 Security Assessment

You’re Vulnerable. And You Don’t Even Know It —Microsoft Office 365 Security Misconfigurations

The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office 365 implementations. The report echoes our finding over the last few years – many organizations adopted Office 365 without doing a proper assessment of their security needs, and how these should be supported by […] The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of  … The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office  … The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office 365  …

The Case for Modernizing Your Active Directory

Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a good idea—it’s a necessity. Unfortunately, few IT departments are equipped to undertake such a project. Malheureusement, très peu de services de TI internes sont bien outillés pour entreprendre un tel projet. Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning  … Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a  … Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a good  …

Active Directory and Regulatory Compliance: What You Need to Know

You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active Directory, you reduce your exposure both now and into the future. You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active  … You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active Directory, you reduce your exposure  … You—not regulators, not auditors—control your company’s exposure. By implementing proper controls in Active Directory, you reduce your exposure both now  …

Service Levels and Active Directory Disaster Recovery

To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build an effective disaster recovery plan and ensure that it is regularly tested, reviewed and refined. Offering service levels on Active Directory under these circumstances is achievable. Do these things and it will be good for your business-and your sleep! To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build  … To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build an effective disaster recovery  … To reduce Active Directory downtime and the related loss of productivity make it your priority this year to build an effective disaster recovery plan and  …