Image Resources
Enable DKIM in Exchange Online Protection
Last year Microsoft announced support for DomainKeys Identified Mail (DKIM) signing for outbound emails in Office 365. If you are wondering what DKIM is, below is an excerpt from Microsoft blog describing what DKIM is in its simplest form.
Image Resources
Dollars and Sense: Cloud Benefits for the CFO
Green House Data VP of Finance Jason Graf explains how to present a cloud initiative and cloud benefits to your CFO or other financial leaders.
Image Resources
Don’t Leave Your Digital Keys Under the Mat
Systems Engineer Jim Taylor talks about the biggest password mistakes, plus some tips on crafting (and remembering) strong, unique passwords.
Image Resources
Don’t Take the Bait! Avoid Phishing Scams with Tips from the GSC
GSC Team Lead Andrew Long offers tips to avoid digital scams from phishing e-mail and social engineering.
Image Resources
Don’t Let Your Data Get “Taken”: Avoid Cryptowall
As much as we like to compare ourselves to Liam Neeson, our set of skills won’t help you avoid a ransom if you fall victim to a Cryptowall exploit.
Image Resources
Don't DROWN: Check Your Servers for HTTPS Vulnerability
This week a new vulnerability in OpenSSL was uncovered. Learn how to check your site for DROWN vulnerability and what you should use to replace SSLv2.
Image Resources
Does Your Organization Need Cyberinsurance?
In a cloud-based IT world, cyberinsurance can help mitigate the cost of a data breach. But does every organization need it?
Image Resources
Does Your IT Department Have a Cloud Service Manager?
New job roles for cloud management identify business drivers, manage cloud contracts, and keep track of the lifecycle of a cloud service.
Image Resources
Do You Need to Worry About GDPR Compliance?
Learn what security requirements fall under GDPR, what situations would require compliance, and how you need to change operations to avoid sanctions.