CISA – the Cybersecurity & Infrastructure Security Agency – has released a very useful tool to help IT personnel detect malicious activity in an Azure/Microsoft 365 environment. EXP consultants can now run this tool against our clients cloud tenants at Microsoft and potentially identify accounts […]
October is National Cyber Security Awareness Month. In 2004, the Department of Homeland Security and the National Cyber Security Alliance launched National Cyber Security Awareness Month as a broad effort to help Americans stay safe and secure online. The threat landscape has exponentially grown […]
EXP Technical recently hosted a FREE webinar: Collaborating Remotely and Safely In A Changed IT World.
The webinar overview:
Effects of the Pandemic on IT practices
Safe IT work practices in a changed world – how good Cyber Security is more important (and more difficult…) than ever
Using collaboration […]
EXP Technical will host a FREE webinar on Thursday, September 10th 2020.
FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES!
FREE DRAWING FOR A MICROSOFT SURFACE FOR ONE LUCKY WINNER!
Pat Cooke, CISSP and Principal at EXP will host a free webinar on Thursday, September 10th 2020 […]
Most of us have unknowingly amassed a massive footprint of personal information that encompasses all aspects of our lives and choose to keep it stored in an extremely vulnerable centralized repository; our personal email address.
Along with being one of the largest employers in the greater Seattle area, Microsoft has also helped create a wide network of local vendors and suppliers — all of which are required to meet compliance standards.
Whether its work or personal, passwords are an integral part of our routines at every level of access, and with the increasing complexity of illicit attempts to gain entry into our lives of password laden data it forces us to adapt and further enforce our own internal password policies & procedures.
In doing so it also creates additional points of user vulnerability if we continue to rely on the password storage recall techniques of days past.
There is a lot more to maintaining a good cybersecurity program than the five important items mentioned here, especially if you are in a high-compliance line of work such as healthcare or government contracting. But it’s an excellent place for small and medium organizations to start.
Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs.
Over the last 2-3 years we have seen an exponential increase in cyber security attacks among our clients. Virtually all businesses in all industries are at risk – it’s not just big business anymore! We have developed a simple program for all our clients to assess their current risk and reduce the risk of falling victim to an attack, while being cognizant of the costs. Join us to find out how you can improve your security position without breaking the bank.