Do You Know Who Has Access to Your Systems?

This blog gets at a really important topic for businesses, especially smaller businesses that don’t have a lot of extra resources for dealing with IT admin. Using a centralized access control system to make sure your systems aren’t accessible by people who have left your company is really important to overall security. The last time…

Stay Ahead of Hackers by Changing Your Passwords

We’re continuing to explore the topic of passwords and how they help keep your business data and systems secure in this next blog on when and how you should update your passwords. An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5!…

Strong Security Starts with Strong Passwords

We have been thinking a lot about client security lately. When we came across this blog series about passwords, we knew we had to share it with all our clients. It’s all too easy to think passwords are a nuisance—when really they’re essential to keeping your data and your business safe. If you use the…

Data Backup Essentials – What Every Company Must Know

Any loopholes in managing company data can have serious consequences. Take, for example, Morgan Stanley which had to pay up financier Ronald Perelman a whopping $1.45 billion, in part because the global giant could not produce all the critical email communication during the trial’s disclosure phase. Whether yours is a small, medium-sized, or large business,…

Multiple Security Flaws Found In Cisco Aironet Access Point Software

Cisco has disclosed 13 big security vulnerabilities in its most recent software security advisory for Cisco IOS and Cisco IOS XE. The company said that all administrators should review their devices to determine which version of this software they are using. Running an outdated version could mean their devices are exposed to some of these vulnerabilities, said…

‘Tarmac’ Virus Enters your MacOS as ‘Pop-ups’

A new form of malware, dubbed ‘Tarmac’ is making its appearance on Mac devices. What is Tarmac malware? How does it work? Tarmac is a ‘malvertisements’ or malicious ads discovered by security researchers. Tarmac malware is also known as OSX. Tarmac is actually a companion of Shlayer, an older program. The two viruses work together to infect…

New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild

Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world’s most widely used mobile operating system, Android. What’s more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers,…

What are the Differences Between Azure Active Directory and Azure Active Directory Domain Services?

Some of the most commonly asked questionsI asked are around tradational on premise Active Directory and Azure AD services and the differences between all the flavours available to them when adopting a hybrid posture. More specifically, what are the difference between: Azure Active Directory (AAD) Azure Active Directory Domain Services (AADDS) Active Directory (AD) It’s essential to understand…