Why Granular SharePoint Backup and Recovery is Important

Selective, granular SharePoint backup and recovery can help organizations to meet security standards, comply with industry regulations, and reduce liabilities. Learn why a blanket backup solution is not always the best option.
The post Why Granular Sha… Continue reading Why Granular SharePoint Backup and Recovery is Important

Social Engineering: The Insider Threat to Cybersecurity

Social engineering attacks involve manipulating employees into performing actions or divulging confidential information that will be maliciously used to break into the organization’s network. Learn the common techniques used and how to defend aga… Continue reading Social Engineering: The Insider Threat to Cybersecurity

Zeus Virus AKA Zbot – Malware of the Month, November 2019

The Zeus Virus, or Zbot, is a crafty and undetectable strain of malware that has been rather resilient and shown a strong ability to evolve since its first detection in 2007. For that reason, it’s our Malware of the Month for November, 2019.
The post Z… Continue reading Zeus Virus AKA Zbot – Malware of the Month, November 2019

Identity Theft on the Dark Web: Understanding the Full Impact of a Data Breach

The dark web has made identity theft a “lucrative business” which is leading to more pervasive and ingenious attacks – often targeting your customer’s credentials. Learn how to protect your data, business reputation, and customer base… Continue reading Identity Theft on the Dark Web: Understanding the Full Impact of a Data Breach

Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and Beyond

Multi-factor Authentication (MFA) combines what the user knows (password), with what the user has (security token) and what the user is (biometric verification) to ensure user identity. Learn why this verification method is vital in today’s world.
The … Continue reading Why Multi-Factor Authentication (MFA) Is a Must-Have in the Microsoft World and Beyond

XML External Entity (XXE) Attacks — Web-based Application Security, Part 5

XML External Entity (XXE) attacks are a form of injection attack that target weak XML parsers with the goal of exposing confidential information that should typically not be accessible. Learn how they work and how to protect against them.
The post XML … Continue reading XML External Entity (XXE) Attacks — Web-based Application Security, Part 5

2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways

Since 2015, Unitrends, a leading all-in-one enterprise backup solution provider, has conducted their annual Cloud and Disaster Recovery Survey to gauge the state of data backup across a wide range of organizations. Here are some of the major takeaways … Continue reading 2019 Cloud and Disaster Recovery Survey: 3 Key Takeaways