Commentary
News
News
News
News
News
Commentary
News
Quick Hits
News
News
Quick Hits
Commentary
News
Quick Hits
Quick Hits
Commentary
Quick Hits
News
Commentary
This comment is waiting for review by our moderators.
In reply to: Pending Review
Joe, I am absolutely agree with you, it's really right words
In reply to: 192.168.1.1">Re: 192.168.1.1
Useful and interesting article. Thanks. Just continue composing this kind of articles
In reply to: 192.168.0.1">Re: 192.168.0.1
This comment is waiting for review by our moderators.
In reply to: Pending Review
This comment is waiting for review by our moderators.
In reply to: Pending Review
This comment is waiting for review by our moderators.
In reply to: Pending Review
While O365 backup is an important discussion to have, this seems perhaps self-serving when Barracuda just released their SharePoint backup solution only a few months ago (Oct 2016). Did it only become important because they...
In reply to: Self-serving?
@Charlie: Chalk that up, I suspect, to a combination of bureaucracy and "CYA" processes. ;)
In reply to: Re: Two weeks of unnecessary exposure?
While the key takeaway is valid (admins should have a valid plan to restore data with private cloud SaaS/IaaS solutions), there are some nuances to be made: -SharePoint Online Recycle bin retention is 93 days not 30 -SharePoint...
In reply to: Some nuances
Insane practice. I proudly saved one of my 501C3 accounts from a horrible Cryptolocker attack in January of 2014 - ransomware from executive director's machine to server at 1:45 am. Everything encrypted. Because...
In reply to: Re: Recycle bins, really?
Latest Comment: This comment is waiting for review by our moderators.
Security Vulnerabilities: The Next WaveJust when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.