dcsimg

How to Strengthen Microsoft Teams Security

Microsoft Teams is an online collaboration platform that is a part of the Office 365 suite. Microsoft Teams enables employees, executives, and other relevant stakeholders to seamlessly communicate and collaborate on projects from any location, using virtually any device. Private messages can be sent via the Chat feature, which uses OneDrive for Business to store file attachments. You can also make … [Read more...]

Best Practices for Azure AD Security

Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. It allows employees to access data and applications, such as Office 365, Exchange Online, OneDrive, and more. An increasing number of organizations are migrating data from their on-premises AD environment to Azure AD, to take advantage of the benefits that cloud platforms provide. However, Azure AD … [Read more...]

What Are Phishing Attacks and How do They Happen?

Phishing is a social engineering technique commonly employed by cyber-criminals to trick unsuspecting victims into downloading a malicious application or visiting a malicious website. Phishing attacks are typically carried out via email, although other mediums can be used, hence Vishing (Voice Phishing), and Smishing (SMS Phishing). In most cases, the goal of phishing is to obtain sensitive … [Read more...]

What Data Security Threats to Look Out for in 2021

A lot has changed since the COVID-19 pandemic arrived on our shores, including the already complex and evolving world of data security. Many more employees are now working from home, and many will continue to do so, even after the pandemic eventually subsides. Allowing employees to work from home can be beneficial for both parties, however, many companies were woefully unprepared for the security … [Read more...]

How Excellus Could Have Avoided the $5.1m HIPAA Violation Penalty

In January 2021, an American Health insurer by the name of Excellus agreed to pay over $5.1 million to the Office for Civil Rights (OCR) at the US Department of Health and Human Services (HHS) in a settlement after violating the Health Insurance Portability and Accountability Act (HIPAA). Excellus Data Breach The violation in question relates to a data breach that resulted in the sensitive data of … [Read more...]

Office 365 Data Loss Prevention Tips

Over the past fifteen years, we’ve seen a relatively consistent increase in the number of annual data breaches. We’ve also seen an increase in the number of stringent data privacy laws being introduced across the globe, and a failure to comply with these laws may result in large fines being levied against the non-compliant organization. That said, 2020 has actually seen a decrease in … [Read more...]

Top 20 Data Breaches of 2020

Let us start the new year with some positive news. Despite the coronavirus pandemic, the number of data breaches in 2020 fell by 52%, at least in the first six months anyway. That said, we’ve still seen a large number of high-profile cases, some of which involving billions of exposed records. Top Data Breaches of 2020 Below is a round-up of the 20 biggest data breaches we saw in 2020. … [Read more...]

The 5 Biggest Cybersecurity Threats for the Healthcare Industry

The healthcare industry continues to grapple with a myriad of security threats, ranging from insider threats to malware and DDoS attacks. Unlike other industries, healthcare is faced with a unique set of challenges. Budgetary constraints and a general lack of executive leadership have made it very difficult for service providers to stay ahead of the curve, yet a failure to do so could cost lives. … [Read more...]

How to Prevent Kerberoasting Attacks

Kerberos is an authentication protocol that uses tickets to provide strong authentication for client/server applications and became the default authentication method for Windows 2000 and later versions. The Kerberos protocol uses either symmetric-key or public-key cryptography to provide secure communication with other services and applications on the network. However, as with any widely adopted … [Read more...]

How to Classify Data in Office 365

Organizations have a tendency to hoard large amounts of unstructured data, some of which may contain data that is confidential, such as credit card numbers, passport numbers, health-related information, and so on. When I say, “unstructured data”, I’m talking about data that doesn’t fit into a traditional relational database, with rows, columns, and keys. Such data might include Word … [Read more...]