Top Cloud Security Threats

Be prepare, your IT teams will have to fight with these top Cloud Security Threats in 2018. As more data and applications are moving to the cloud, it has also introduced a lots of new security threats and challenges. Here are the top cloud security issues: Data breaches Data breach is the primary objective of … Read more

2017’S Biggest Data Breaches – A Look Back

A look back in 2017’s where millions of records breached every day. As we see, the Data breach activity was high in throughout 2017, with 1,202 breaches in the 11 months alone, according to a report from the Identity Theft Resource Center. From the WannaCry attacks, Equifax, Deloitte to Uber, it seems like there’s a new … Read more

Things You Should Know About Governance and Management System for GDPR Compliance

GDPR and the Protection of Personal Data include wide range of legal obligations such as: You need to keep documentation for demonstration Clearly define the approach of data protection using risk-based along with roles, responsibilities and accountabilities of data controllers and their processors Compute the risk of processing personal data and ensure the protection of … Read more

Powershell to Find Inactive AD Users and Computers Accounts

In this blog we see how to find disable and inactive Active Directory user and computer accounts and move them to different OU. The LastLogon and LastLogonTimeStamp attributes can help you to decide if an Active Directory user account or computer account is active or inactive. Powershell to find inactive accounts Active Directory for 90 days … Read more

Step by Step Exchange 2007 to Exchange 2016 Migration Guide

In this blog, we will discuss how to migrate from Exchange server 2007 to Exchange server 2016. As we know, upgrading from Exchange server 2007 to Exchange server 2016 is considered a tedious task as it cannot be done directly. Refer to below TechNet article for more information. Can’t install Exchange server 2016 in a forest … Read more