720-891-1663

Best Practices for Office 365 Monitoring

Logging, monitoring and alerting is probably the single biggest weakness that most organizations have. Office 365 is also likely the single biggest vulnerability. So what actions should you be monitoring in Office? According to AT&T’s Alien Vault division, here is the answer.  User access – who is there normally; what is your user baseline.  Are […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Will Hackers Compromise the Census by Attacking Library Computers?

The U.S. Census wants people to respond online because it will save them money.  They don’t have to transfer data from paper forms and they don’t have to send census workers out.  From a pure finance standpoint, it makes perfect sense.  The census will cost us about $15 billion this time around. And, from a […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Top Threats To Cloud Security – The Egregious Eleven

The cloud has become an important part of every companies IT solution.  Whether you are using a third party software as a service or building your our solutions in the cloud, the cloud is not risk free.  Just ask Capital One if you have any questions about that. So what are the things that you […]

Continue reading → [DISPLAY_ACURAX_ICONS]