Category: Uncategorized

Active Directory : The foundation of an organization’s access, authorisation, and authentication

Active Directory : The foundation of an organization’s access, authorisation, and authentication

Active Directory : The foundation of an organization’s access, authorisation, and authentication Regardless of the original access vector used by a threat actor, Microsoft Active Directory (AD) remains a prominent target in an organisation due to its relationship to privilege and access. The threat actor compromised AD Domain Administrator credentials in the majority of cyber

Read More
Do you have Litigation hold for M365, that gives you sense of security?

Do you have Litigation hold for M365, that gives you sense of security?

It’s easy to confuse litigation hold with backup – both have something to do with ‘protecting’ data. However, backup and litigation hold differ in many ways, and any organization that fails to appreciate the differences between them (and the benefit of each) will eventually pay the price. Let’s look at the fundamental distinctions between litigation

Read More