What is Data Leakage and How Do You Prevent It?

What is Data Leakage? Data leakage is when sensitive data is unintentionally exposed to the public. Data can be exposed in transit, at rest or in use. Data exposed in transit can include data sent in emails, chat rooms, API calls, and so on. Data exposed at rest may be the result of a misconfigured cloud storage facility, and unprotected database, or from lost or unattended devices. Data exposed … [Read more...]

How to Audit Exchange Online Activity

As the inevitable shift from self-hosted to cloud-based IT environments continues, Microsoft Office 365 products, such as Exchange Online, are becoming increasingly more valuable to enterprises across the globe. Exchange Online is quickly becoming the go-to solution for managing emails, calendars and contacts, to help your employees communicate and collaborate in a secure manner. There are, … [Read more...]

How to Strengthen Microsoft Teams Security

Microsoft Teams is an online collaboration platform that is a part of the Office 365 suite. Microsoft Teams enables employees, executives, and other relevant stakeholders to seamlessly communicate and collaborate on projects from any location, using virtually any device. Private messages can be sent via the Chat feature, which uses OneDrive for Business to store file attachments. You can also make … [Read more...]

What Data Security Threats to Look Out for in 2021

A lot has changed since the COVID-19 pandemic arrived on our shores, including the already complex and evolving world of data security. Many more employees are now working from home, and many will continue to do so, even after the pandemic eventually subsides. Allowing employees to work from home can be beneficial for both parties, however, many companies were woefully unprepared for the security … [Read more...]

How to Classify Data in Office 365

Organizations have a tendency to hoard large amounts of unstructured data, some of which may contain data that is confidential, such as credit card numbers, passport numbers, health-related information, and so on. When I say, “unstructured data”, I’m talking about data that doesn’t fit into a traditional relational database, with rows, columns, and keys. Such data might include Word … [Read more...]

On-Premise vs Cloud Data Storage: Pros and Cons

Even before the current health crisis began to unfold, many executives and IT personnel have been debating about the practicalities and implications of storing and processing sensitive data in the cloud. Using cloud services for the storage and processing of valuable data is understandably tempting, as it allows organizations to eliminate numerous costs and responsibilities. There are, however, … [Read more...]

What Are Office 365 Groups?

Office 365 Groups are similar to the security groups we see in Active Directory, however, they come with some additional benefits, which we will explore. Firstly, let’s clarify what a “group” actually is. What is an Office 365 Group? A group is a bit like a container which users are placed in. Each group will have a set of permissions assigned to it, which determine how the users … [Read more...]

AWS Security Management and Best Practices

Amazon Web Services (AWS) has become one of the most popular cloud service providers on the market. As with most reputable cloud providers, AWS is relatively easy to use, scalable, affordable and flexible. They typically provide reliable encryption and security features, and various collaboration services that can help organizations streamline their business operations. However, when using any … [Read more...]

Active Directory Security Best Practices

Attackers are persistent in their pursuit to compromise Active Directory services due to their role in authorizing access to critical and confidential data. As organizations expand, their infrastructure becomes increasingly more complex, which makes them a lot more vulnerable to attack as it is harder to keep track of important system changes, events and permissions. It’s also becoming a lot … [Read more...]

Auditing Administrator Access Rights in Active Directory

IT administrators require elevated rights in Active Directory to carry out certain tasks, a fact that we can’t deny. However, should an attacker gain access to a user account in AD with admin-level privileges, they will have free reign to do pretty much anything they choose. They can potentially download a database containing large amounts of PII, or access folders containing valuable … [Read more...]