Understanding the cyber kill chain and how it impacts Microsoft 365
The cyber kill chain is a cybersecurity model that details the stages of a cyberattack. Learn all about it and how it impacts Microsoft 365 environments.
The cyber kill chain is a cybersecurity model that details the stages of a cyberattack. Learn all about it and how it impacts Microsoft 365 environments.
Disasters come in all shapes and sizes - learn how to develop your own strategy for disaster recovery data loss and how to reduce downtime.
Continuous data protection has emerged as a form of data protection that picks up where legacy backup tactics leave off. Learn when it’s best to use it.
Learn a seven-step plan you can use to inform your organization’s data backup strategy, from initial assessment through ongoing testing.
Learn the most common Active Directory attacks, how they unfold and what steps organizations can take to mitigate their risk.
A solid data recovery plan is vital for every organization, but what should be included? Learn the 4 key areas needed to create a recovery plan.
Attack paths are an issue for any identity and access management system. Learn what they are and the most common ones targeting Active Directory.
Learn about immutable backups: what they are, how they work, what they protect and what to ask when you’re evaluating them.
Learn everything you need to know about attack vectors; what they are, who launches them and how to defend your network.
Learn about the types of air gaps you can use to reduce your attack surface and eliminate the ransomware attack vector targeting backups.
Every organization needs a solid ransomware recovery strategy to combat the potential devastation of ransomware attacks. Here are a few best practices to get started.
Quest experts predict the trends for next year, and all agree that a key theme will be overcoming the IT talent shortage. Check out our top 9 predictions.