“Some people would rather crawl blindly in the dark, rather than turn on the light and see how close they are to the edge of the cliff.” — Phineas Bartholomieu Thome, my great-great-great grandfather Cybersecurity has been on the business… Read More ›
4 Rules for Protecting your Web Application.
Imagine you’ve just built your dream home – a sprawling mansion decked out with all the amenities you’ve always dreamt of having. Tennis courts, fully-equipped kitchen with a stocked bar, in-house movie theatre, your own 24/7 Whataburger… the works! You… Read More ›
3 Critical Tips to Secure Your Office 365.
The ubiquitous Office 365 has a lot of powerful options for safety, security, and logging – but almost none of it comes configured out of the box; you, the administrator, need to put in the leg-work to take full advantage… Read More ›