G Suite Security

G Suite Security: Five Mistakes Every Admin Should Avoid

If your business is migrating to or using Google’s suite of business productivity tools, you might be concerned about properly securing G Suite use. While Microsoft Office 365 still wears the cloud office productivity crown, more than five million businesses now use G Suite, and that number is growing fast. Our partners at Okta noted in their 2019 “Business @… Read More

Person holding head in hands and sitting at a desk

Why Your Incident Response Plan Won’t Save You

Do your spring-cleaning plans call for refreshing and improving your cyber security incident response plan (CSIRP)? If so, that means your organization has a CSIRP – and hats off to you, because you’re in the minority. As much talk as there is in cyber security circles and conferences about developing and improving incident response (IR) plans,… Read More

A secure computer illustrated through a lock around the monitor.

How to Improve Your Office 365 Data Protection and Threat Mitigation Strategies

In today’s post, we’ll discuss how to improve your Office 365 data protection and threat mitigation approach to better protect your environment from external threats. In our previous post about Office 365 security features, we outlined how to make the deluge of Office 365 security event information actionable. We also highlighted the importance of implementing sound identity, access, and privilege management approaches. Now let’s see what else you… Read More

Hands holding a tablet connected to a secure Office 365 cloud

Office 365 Security Features Demystified

Microsoft has numerous Office 365 security features built in to help you monitor activity, protect data, identify threats, and manage identity, access, and privileges. But getting the most out of those tools can be difficult, particularly for mid-sized organizations. Integrating them with data from other sources in your network and cloud is even more challenging…. Read More

Students learning and using computers.

2019 University Cyber Attacks: How Can You Protect Your Organization?

In 2019 university cyber attacks have been making headlines. Many colleges and universities, mainly those in the U.S. and other NATO countries, have become targets for cyber criminals and nation-state actors. In the ever-evolving cyber ecosystem, security professionals and their adversaries engage in continuous virtual combat. Cyber criminals have historically been more focused on targeting… Read More

Hands holding mobile devices connected to the cloud.

2019 Cloud Security Research: Take the Survey and Get the Free Report

Delta Risk has partnered with Cybersecurity Insiders to examine the latest trends in cloud security. Everyone who completes this comprehensive survey will receive a copy of the complete 2019 Cloud Security Report as a thank you as soon as it is published. The survey is based on real-time feedback from IT security professionals in the… Read More