Common Cybersecurity Issues and Challenges

<p>The rise of new technologies—ranging from the internet of things (IoT) and Big Data to artificial intelligence (AI) and machine learning (ML)—has changed the way organizations operate, compete, and evolve. When deployed strategically, each of these emerging technologies can offer organizations a leg up in a fast-paced marketplace, greater insight into their operations, and more control … [Read more...]

Announcing MDaemon 19.5 – With Redesigned Mobile Webmail & More!

The news is out. There’s a new version of MDaemon Email Server, with new features and improvements to benefit both administrators and end-users alike! New Features for Administrators Centralized Management of Email Client Signatures Most businesses follow certain custom branding practices in their email communications, but inevitably there will be those end users who have not updated their email … [Read more...]

How to Recover Deleted Files from Network Shares

You may have discovered—and too late—that while you can recover some deleted files from the Windows Recycle Bin on local machines, you cannot recover deleted files (accidentally or otherwise) from network drive shared folders. If you delete a file from a network share, it is gone. If you look in the Recycle Bin, it won’t be there.  This happens because Windows is organized … [Read more...]

Searching Active Directory with PowerShell

For many Microsoft IT professionals, one of the first things they do with PowerShell is using it to perform tasks in Active Directory. … [Read more...]

How to Supercharge PowerShell Objects for Hyper-V

Everything in PowerShell is essentially an object. This enables you to do really cool stuff. Here are some excellent uses that Hyper-V admins will love! Read the post here: How to Supercharge PowerShell Objects for Hyper-V … [Read more...]

Partnering—The Way to Win with SIEM and SOC Without Breaking the Bank

<p>According to Symantec, <a href="https://www.symantec.com/security-center/threat-report&quot; target="_blank">58% of cyberattacks target small and-medium sized businesses</a> (SMBs); the Federation of Small Businesses (FSB) reported that SMBs in the UK alone “<a href="https://www.fsb.org.uk/media-centre/press-releases/small-firms-suffer-c…; Read More … [Read more...]

Tenable Named a Leader in Vulnerability Risk Management by Independent Research Firm

Tenable is top-ranked among 13 vendors in both Strategy and Current Offering  Tenable®, Inc., the Cyber Exposure company, today announced that Forrester has named the company a Leader in its report, “The Forrester Wave™: Vulnerability Risk Management, Q4 2019.” Tenable ranked the highest among 13 vendors evaluated in both the Strategy and Current Offering categories.  The report, which … [Read more...]

Thycotic Earns Placement on Cybersecurity Companies To Watch In 2020 List

WASHINGTON, D.C., Oct. 17, 2019 — Thycotic, provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, including 25 percent of the Fortune 100, today announced it has been named one of the Hot 150 Cybersecurity Companies to Watch in 2020. The list was published by Cybersecurity Ventures, a leading researcher and publisher of reports covering global cybercrime … [Read more...]

How does the GDPR affect sole traders?

Almost all EU-based organisations are affected by the GDPR (General Data Protection Regulation), from sole traders to multinationals.  But even though the GDPR unifies data protection rules across Europe, not all businesses will face the same problems. We’ve covered many of the issues you’re likely to face, but this blog focuses on the way sole traders should approach their compliance … [Read more...]

Why the Real Estate Industry Could Do More to Secure Data

When it comes to cyber-attacks, the real estate industry rarely makes the headlines. Yet, real estate companies deal with high value transactions on a daily basis and are frequently targeted by hackers. Not only that, but despite storing and processing large amounts of financial data, real estate firms are not bound by any industry-specific data protection regulations, such as HIPAA, PCI and SOX, … [Read more...]