Security

Selective two-factor authentication still leaves you vulnerable

Two-factor (or multi-factor authentication) is a very effective way of providing an additional layer of security for systems and data. It’s relatively trivial these days for attackers to compromise usernames and passwords, and two-factor authentication puts another line of defense […]

Selective two-factor authentication still leaves you vulnerable Read More »

Office 2016 IT Pro and Developer Preview gives admins plenty to look forward to

If you’re a consumer or end-user there isn’t much (if anything) to get excited about yet. For IT admins, however, the new and improved features in the Office 2016 IT Pro and Developer Preview are very good news. Microsoft has

Office 2016 IT Pro and Developer Preview gives admins plenty to look forward to Read More »

CrowdStrike wants to help make sure you’re not the next Sony

Most cyber attacks against a corporation aren’t conducted by a nation-state. Most cyber attacks against a corporation don’t seek to literally destroy data and PCs. The recent attack against Sony was not most attacks. I had a chance to talk

CrowdStrike wants to help make sure you’re not the next Sony Read More »

Scroll to Top