Cyber Security Essential Eight and Microsoft Part 1 here. Continuing on from Part 1, here’s the second half of the Australian Government’s “Essential Eight” recommendations in mitigating Cyber Security Attacks, and where Microsoft fits into meeting them....
The Australian Government has promoted its “Essential Eight” recommendations in mitigating Cyber Security Attacks for quite some time. These recommendations are quite solid, and worth reviewing for any organization. Let’s have a look at the first...
Multi-factor authentication (MFA) and the eventual abandoning of password based authentication is just around the corner. Of course MFA is available on many services right now, but saying goodbye to passwords is still a work in progress. The state of MFA with...
For as long as many of us can remember we have been starting our World Wide Web journeys by typing http://. If you have not already noticed, many sites now require https:// to access them. As a refresher, recall that HTTP actually stands for hyper text transfer...
Ransomware is no joke. Even those organizations who think their environments are up to date with patches and procedures have found themselves in a precarious position over the last few years. The simplest way to protect virtual machines against ransomware is to back...
New Years Resolutions. Some people love them, and some people hate them. Some stick to them throughout the year, and others have already ignored them at this point in January. That being said, I have put together three simple 2018 Information Security resolutions...
Hi my name is Theresa Miller and welcome to 24x7 IT Connection! Here you will find experiences from the real world of technology and career. All content is from top experts that experience technology in their work every day. Glad you are here and be sure to follow or subscribe to get the latest information today!