Statistically speaking, 53% of everyone reading this article is on a mobile device. A short 10 years ago, the average person didn’t even own a
Data integrity and protection are two of the most important tenets of using SQL databases. In most cases, IT will set up daily backups and
I previously wrote about reviewing Office 365 accounts that you suspect being compromised using the Audit Log. This is useful when you are doing remediation
Dealing with account breaches is never an enjoyable activity. It typically gets even more sour when you can only get limited information on what happened.
Imagine this scenario that System Administrators are more commonly being faced with: An end user forwards along an e-mail inquiring about its legitimacy. The e-mail
The threat of a cybersecurity breach is often overlooked in the chaos of an acquisition, despite the potential risk such breaches can have on the
The Payment Card Industry Data Security Standard (PCI DSS) is a set of compliance requirements against which merchants, payment gateways, issuers and other organizations who
Tabnabbing is a type of social engineering attack where a hacker replaces the contents of a dormant browser tab with a spoofed website intended to
As sad as it sounds, Sikich has been involved in many breach remediation efforts related to Office 365. Not that the infrastructure or service was
It is best practice to periodically review the security accounts held in Active Directory so that inactive accounts can be disabled or deleted. This regular
Buying the latest and greatest, best-of-breed security solutions without employing a risk-based approach to security is not a sound strategy for an information security program.
When you’re wading into the external vulnerability scanning requirement of the Payment Card Industry Data Security Standard (PCI DSS), the most frequent question we hear