720-891-1663

Best Practices for Office 365 Monitoring

Logging, monitoring and alerting is probably the single biggest weakness that most organizations have. Office 365 is also likely the single biggest vulnerability. So what actions should you be monitoring in Office? According to AT&T’s Alien Vault division, here is the answer.  User access – who is there normally; what is your user baseline.  Are […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending September 6, 2019

Cisco: Critical Bug Allows Remote Takeover of Routers Cisco rated this bug 10 out of 10.  For users of Cisco 4000 series ISRs, ASR 1000 series aggregation routers, 1000v cloud routers and integrated services virtual routers, an unauthenticated user can gain full control just by sending a malicious HTTP request.  So yet another reminder that […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Will Hackers Compromise the Census by Attacking Library Computers?

The U.S. Census wants people to respond online because it will save them money.  They don’t have to transfer data from paper forms and they don’t have to send census workers out.  From a pure finance standpoint, it makes perfect sense.  The census will cost us about $15 billion this time around. And, from a […]

Continue reading → [DISPLAY_ACURAX_ICONS]