It should serve as no surprise, two of the breaches profiled this week occurred as the result of compromised email address and passwords. The particular events highlight the need to make password hygiene and compromised credential monitoring front and center. 1,078 more words
Tags » Cloud Security
Whether you are just considering your move to Office 365 or are already there, you’ve no doubt been thinking about operations and disaster recovery.
Microsoft remains committed to 752 more words
As is true with most Microsoft products, there are a number of ways you can architect Office 365 to work with your infrastructure or replace it entirely. 552 more words