Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Microsoft 365 Email Continuity Service - Is it Needed?

Microsoft 365 has experienced several notable outages recently. In January 2023, a major outage lasted over five hours, affecting various services, including Exchange Online. This incident was attributed to a network configuration issue during a planned update (Practical 365). Another significant outage occurred in June 2023, impacting services like Outlook, Teams, and OneDrive for several hours due to a network issue (WinBuzzer).

A Guide to Complying with the Australian Signals Directorate

The Australian Signals Directorate (ASD) is a government agency responsible for providing foreign signals intelligence and ensuring information security for Australia’s national interests. The ASD also significantly enhances the nation’s cybersecurity through strategic advice, standards, and protective measures.

A Guide to New Zealand's Cybersecurity Standards

In an age of increasingly complex cyber threats, New Zealand has implemented robust cybersecurity standards to secure the online environment for individuals, businesses, and government entities. New Zealand's cybersecurity approach is unique and effective, from the overarching strategies laid out by national cybersecurity policies to specific regulatory requirements that impact sectors like healthcare and finance.

FedRAMP vs. ISO 27001: How They Compare and Which Do You Need?

In the world of security, there are many different frameworks that may be relevant or important to your plans. We’ve talked a lot about FedRAMP, the federal government’s security framework, but it’s only one of many options. Others, from HIPAA to FISMA to SOC2, can all have their role. One of the biggest and most direct equivalents to FedRAMP is ISO 27001. What is it, how does it compare to FedRAMP, and which one should you use? Let’s talk about it. Table of Contents 1.

The Public Role in the MSDB Database, No Proxies Allowed

SQL Agent proxies are a form of built-in service that allows the schedule and running of automated tasks within SQL Server. These tasks can perform various actions related to database management. The msdb database is a crucial system database in Microsoft SQL Server which primarily serves SQL server agents. These databases store information related to SQL Agent jobs, including their configuration, execution history, vital system tables and data.

Are Google-Generated Passwords Safe?

Google’s auto-generated passwords aren’t typically the most secure as the character limit is 15. Having a limit of 15 characters prevents a user from creating longer passwords. The longer a password is, the harder it is for cybercriminals to crack. Continue reading to learn more about Google-generated passwords and why they are not the most secure option for your digital security.

How To Ensure HIPAA Compliance With a Password Manager

The Health Insurance Portability and Accountability Act (HIPAA) is U.S. legislation created to set national privacy and security standards to protect the privacy of patient health information and prevent data breaches. All organizations associated with healthcare, including health insurance companies and business associates, fall under HIPAA regulations – meaning they have to comply with HIPAA compliance requirements.

Weekly Cyber Threat Intelligence Summary

Welcome to this week’s Cyber Threat Intelligence Summary, where we bring you the latest updates and insights on significant cyber threats. This edition analyses cyberattacks related to the Israel-Palestine conflict, global DNS probing by a Chinese threat actor, and a significant data leak involving the New York Times.

A Vendor Risk Assessment Questionnaire Template

Digital relationships with third-party vendors increase opportunities for growth, but they also increase opportunities for cyberattacks — a recent study found that 61% of U.S. companies said they have experienced a data breach caused by one of their vendors or third parties (up 12% since 2016). Implementing a vendor risk management strategy aligned with frameworks like the NIST security framework can help mitigate these risks.

10 tips for Small Business Cyber Security in 2024

As we move further into 2024, the cyber threat landscape continues to evolve, presenting new challenges and opportunities for small businesses. At Obrela, we understand the importance of staying ahead of these threats and securing your digital assets. Here are some cyber security tips for small businesses to help your enterprise to enhance its cybersecurity measures this year and stay ahead of cyber criminals.