Is Your Data Secure in Office 365?

It is completely understandable why organizations are concerned about the security implications of storing large amounts of valuable data in the cloud. After all, they have no direct control over the policies, procedures and technologies that are used to safeguard their data from malicious actors, which includes safeguarding the data from the service provider’s own employees. However, it is … [Read more...]

Data Security Risk Assessment Checklist

Carrying out regular data security risk assessments is vital to establishing current security gaps and recommending remediations for breach prevention. Many compliance regulations mandate risk assessments as part of a comprehensive security strategy. What is a Data Security Risk Assessment? Data risk assessments can be broken down into three fundamental steps. First, identifying what the risks are … [Read more...]

Microsoft Teams Security, Tips and Best Practices

Remote working and COVID-19 have accelerated the use of Microsoft Teams over the last 12 months. As a collaboration and sharing platform, MS Teams has been a savior to many remote working teams. However, not unlike other collaboration and sharing platforms, MS Teams does have a number of security vulnerabilities that security and IT teams need to understand and address. In this blog, we will go … [Read more...]

Google Drive for Business Security Best Practices

Google Drive has become an invaluable data storage facility for many organizations, as it enables employees to collaborate on projects, regardless of where they are located in the world. Is Google Drive Safe for Business? Of course, Google takes security very seriously, however, as with any cloud service provider, there are inherent risks that you need to be aware of. The most obvious risk being … [Read more...]

What is a Cybersecurity Assessment?

A cybersecurity assessment is a review of your current security controls to see how well they stack up against either known potential security threats or the threats you have directly encountered. The assessment will also evaluate whether you are adequately satisfying the relevant regulatory compliance requirements. While there is no fixed method for carrying out a formal risk assessment, the most … [Read more...]

Best Practices for a Cybersecurity Audit

Cybersecurity audits help organizations establish whether their current cybersecurity practices, policies and tools are up to the task of keeping their data and systems secure. However, cybersecurity audits can be tricky to do on a regular basis when you aren’t sure exactly what to look for. In this blog, I will go through some best practices for your cybersecurity and internal audit to give you … [Read more...]

AWS Security Management and Best Practices

Amazon Web Services (AWS) has become one of the most popular cloud service providers on the market. As with most reputable cloud providers, AWS is relatively easy to use, scalable, affordable and flexible. They typically provide reliable encryption and security features, and various collaboration services that can help organizations streamline their business operations. However, when using any … [Read more...]

Microsoft Office 365 Security Recommendations: How Lepide Helps

With increasingly more people working from home as a result of the ongoing coronavirus pandemic, many organizations have been switching to Microsoft Office 365, and other cloud-based collaboration platforms to help streamline their business operations. However, there are a number of security implications that need to be considered before doing so, and organizations need be aware of the … [Read more...]

Is Data Security Essential or Optional in Today’s New World?

Few industries have fared well during the corona virus pandemic. As you would expect, most of the industries that have either stayed afloat or managed to capitalize on the crisis were those that generated a significant portion of their revenue from online sales. Online shopping, food delivery services, entertainment, gaming, e-learning, dating, and videoconferencing, were amongst the industries … [Read more...]

Active Directory Security Best Practices

Attackers are persistent in their pursuit to compromise Active Directory services due to their role in authorizing access to critical and confidential data. As organizations expand, their infrastructure becomes increasingly more complex, which makes them a lot more vulnerable to attack as it is harder to keep track of important system changes, events and permissions. It’s also becoming a lot … [Read more...]