How Active Directory configurations can reduce the likelihood of intrusions
Learn real-world insights into how Active Directory configurations can help to harden your cybersecurity defenses and reduce unwanted intrusions.
Learn real-world insights into how Active Directory configurations can help to harden your cybersecurity defenses and reduce unwanted intrusions.
Learn a seven-step plan you can use to inform your organization’s data backup strategy, from initial assessment through ongoing testing.
Many organizations have centralized PST files, yet problems rage on. This post answers the common question, ‘Why can’t OneDrive back up PST files?’.
Learn the most common Active Directory attacks, how they unfold and what steps organizations can take to mitigate their risk.
A solid data recovery plan is vital for every organization, but what should be included? Learn the 4 key areas needed to create a recovery plan.
Attack paths are an issue for any identity and access management system. Learn what they are and the most common ones targeting Active Directory.
Patching vulnerabilities proactively is a must. Learn the security risks of missed patches and best practices for effective patch management.
Learn about immutable backups: what they are, how they work, what they protect and what to ask when you’re evaluating them.
Taking the right steps to secure your Active Directory has never been more critical. Learn 8 Active Directory security best practices to reduce your risk.
Learn about the types of air gaps you can use to reduce your attack surface and eliminate the ransomware attack vector targeting backups.
Active Directory forest is a critical — but often underappreciated — element of the IT infrastructure. Learn what it is and how to manage it.
Pass the hash attack is a decades-old technique used by cybercriminals. Learn how it works and how to defend against it.