Learning Center Article

Log In

Security Advisory - Microsoft 365

by Other | NetDiligence® | 05/29/2020

Cyber criminals are increasingly using weak Microsoft 365® (formerly called Office 365) security configurations to obtain/falsify the credentials of legitimate organizational users, and then use them to ill effect via Business Email Compromise (or “BEC”) attacks.

To read more, please log in

Junto Plus
It’s not enough to acknowledge the threat of ransomware—companies need to be positioned to communicate with threat actors (whether directly or indirectly), contain damage and minimize business interruption associated with this increasingly common form of cyberattack. I talked to David Shear, threat data governance and integration manager of Vigilante, about best practices in preparation and response to ransomware events.
07/13/20 | Junto Plus

HHS Breach Data

Number Reported: 1928

Latest Incident
Capital Nephrology
# of Records:
Type of Breach:
Hacking/IT Incident