Kevin Beaver Principle Logic, LLC - SearchSecurity blog SearchEnterpriseDesktop Windows 10 security tools to have handy 13 Jun 2017 SearchSecurity To secure Office 365, take advantage of controls Microsoft offers 12 Jun 2017 SearchSecurity Office 365 security features: As good as it gets? 12 Jun 2017 SearchSecurity Address Office 365 security concerns while enjoying its benefits 12 Jun 2017 SearchMobileComputing The business case for enterprise file sync-and-sharing tools 05 Jun 2017 SearchMobileComputing Android vs. iOS security: Compare the two mobile OSes 31 May 2017 SearchMobileComputing EFSS technology and its growing role in enterprise mobility 25 May 2017 SearchEnterpriseDesktop Windows 10 keylogger adds fuel to the privacy fire 24 May 2017 SearchSecurity What the end of hot patching mobile apps means for enterprise security 17 May 2017 SearchSecurity How to identify and address overlooked web security vulnerabilities 09 May 2017 SearchSecurity Bolster your DLP strategy with help from the cloud and CASBs 10 Apr 2017 SearchSecurity DLP systems: Spotting weaknesses and improving management 30 Mar 2017 SearchSecurity Sharpen your DDoS detection skills with the right tool 29 Mar 2017 SearchSecurity Android VPN apps: How to address privacy and security issues 28 Mar 2017 SearchEnterpriseDesktop How to create an ideal Windows 10 security setup 20 Feb 2017 SearchSecurity Preventing DoS attacks: The best ways to defend the enterprise 31 Jan 2017 SearchSecurity Monitoring outbound traffic on your network: What to look for 24 Jan 2017 SearchEnterpriseDesktop Five Windows 10 security risks that are easy to overlook 24 Jan 2017 SearchSecurity Zero-day attacks: Addressing the Equation Group vulnerabilities 29 Dec 2016 SearchSecurity How to build an incident response toolkit for enterprise security 29 Nov 2016 SearchSecurity Automated patching technology: What enterprises should consider 29 Nov 2016 SearchEnterpriseDesktop Close Windows security gaps with third-party software patching 21 Nov 2016 SearchEnterpriseDesktop How Microsoft's EMET fits into the Windows security arsenal 09 Nov 2016 SearchSecurity How to buy the best incident response tools for your enterprise 04 Nov 2016 SearchWindowsServer Boost Exchange email security with Critical Security Controls 28 Oct 2016 SearchEnterpriseDesktop BitLocker full-disk encryption makes its case in the enterprise 27 Oct 2016 SearchSecurity How more than 100 malicious Tor nodes were identified 25 Oct 2016 SearchEnterpriseDesktop Sweat the small stuff when it comes to Windows desktop security 11 Oct 2016 SearchSecurity Network security alerts: Managing and overcoming obstacles 20 Sep 2016 SearchSecurity How to prevent ransomware or recover from a ransomware breach 16 Sep 2016 SearchWindowsServer Tighten security with regimen of scanning, Windows Server patching 14 Sep 2016 SearchSecurity DDoS attacks on your DNS provider: Developing a response strategy 22 Aug 2016 SearchEnterpriseDesktop Get to know new versions of Microsoft’s Office productivity suite 17 Aug 2016 SearchWindowsServer How Microsoft Advanced Threat Analytics helps secure Exchange 27 Jul 2016 SearchEnterpriseDesktop Internet Explorer support for old versions is over. What now? 15 Jul 2016 SearchSecurity Best practices for an information security assessment 12 Jul 2016 SearchEnterpriseDesktop Windows POSReady 2009 registry hack brings back Windows XP updates 27 Jun 2016 SearchWindowsServer How to step up your Microsoft Exchange security game 24 Jun 2016 SearchWindowsServer Newer Windows Server versions won't fix security issues 16 Jun 2016 SearchEnterpriseDesktop How to disable Windows 10 pop-up notifications 09 Jun 2016 SearchSecurity Open source Web apps: Spotting security flaws 06 May 2016 SearchSoftwareQuality What are the most important security testing basics? 26 Apr 2016 SearchEnterpriseDesktop Office 2016 features new security enhancements IT will appreciate 22 Apr 2016 SearchSecurity Find the security advantage in SDN 21 Apr 2016 SearchSecurity Where DLP technology is headed, and should you follow? 15 Apr 2016 SearchSecurity Developing a security incident response policy: Avoiding pitfalls 08 Apr 2016 SearchSecurity The security risks of network sensors in the enterprise 30 Mar 2016 SearchWindowsServer Office 365 single sign-on augurs complexity, setup hitches 22 Mar 2016 SearchSecurity What enterprises need to know about Internet traffic blocking 07 Mar 2016 SearchWindowsServer The inevitable Office 365 outage and your recovery plan 03 Mar 2016 SearchWindowsServer Information security resources for Exchange admins 24 Feb 2016 SearchWindowsServer Lock Windows systems down with a security awareness program 19 Feb 2016 SearchSecurity Identifying the warning signs of network intrusions 15 Feb 2016 SearchWindowsServer How to stick to your IT security plan 25 Jan 2016 SearchEnterpriseDesktop Windows 10 migration ahead? Don't forget Windows 7 security 18 Jan 2016 SearchEnterpriseDesktop Uncover PII security risks with free tools 13 Jan 2016 SearchWindowsServer Exchange email security best practices establish safe environment 06 Jan 2016 SearchSecurity FCC compliance may spell trouble for Wi-Fi router security 05 Jan 2016 SearchWindowsServer Take Office 365 data security from the cloud into your own hands 16 Dec 2015 SearchSecurity Weighing the value of deception techniques for enterprises 11 Dec 2015 SearchWindowsServer Squash large business email security challenges 16 Nov 2015 SearchSecurity Three steps to prevent and mitigate router security issues 06 Nov 2015 SearchEnterpriseDesktop Be on the lookout for Linux security vulnerabilities 04 Nov 2015 SearchWindowsServer The price is right for these Windows security tools 04 Nov 2015 SearchWindowsServer How DLP, MFA and other features influence Office 2016 security 22 Oct 2015 SearchSecurity Enterprise wireless security: Secure Wi-Fi today and beyond 19 Oct 2015 SearchWindowsServer Small business security needs big strategies to keep Exchange safe 13 Oct 2015 SearchEnterpriseDesktop Windows 10 improvements help the OS meet enterprise needs 01 Oct 2015 SearchWindowsServer What admins should know about Microsoft Azure security and vulnerabilities 25 Sep 2015 SearchEnterpriseDesktop Weigh Windows 10 features, benefits against business goals 24 Sep 2015 SearchWindowsServer Exchange email security best practices sanction self-assessments 17 Sep 2015 SearchSecurity Microsegmentation strategies for smarter security 14 Sep 2015 SearchSecurity What are the security benefits of self-healing networks? 14 Sep 2015 SearchSecurity Is a DNSSEC implementation an enterprise necessity? 11 Sep 2015 SearchSecurity Should the Netdump flaw deter enterprise ODL SDN use? 09 Sep 2015 SearchSecurity Is network port security a worthwhile enterprise security strategy? 09 Sep 2015 SearchWindowsServer Third-party security monitoring tools abet Exchange flaws 03 Sep 2015 SearchSecurity Six areas of importance in the PCI Penetration Testing Guidance 17 Aug 2015 SearchSecurity Email security gateways vs. Web security gateways: Do you need both? 12 Aug 2015 SearchSecurity What do end-of-software development dates mean for security? 10 Aug 2015 SearchWindowsServer OPM data breach a teachable moment in security basics 10 Aug 2015 SearchSecurity Can a read-only domain controller maximize DMZ security? 10 Aug 2015 SearchSecurity Do enterprises need an internal firewall? 07 Aug 2015 SearchSecurity How to protect corporate data from government surveillance 04 Aug 2015 SearchWindowsServer Windows Update for Business: Breaking bad patch management 31 Jul 2015 SearchSecurity What VoLTE security risks should enterprises be aware of? 30 Jul 2015 SearchSecurity How can the Border Router Security Tool improve enterprise security? 28 Jul 2015 SearchSecurity Security alerts: What's the best way to reduce false positives? 28 Jul 2015 SearchWindowsServer Five vital Windows 2016 security updates 27 Jul 2015 SearchSecurity How can the SSDP protocol be secured to prevent DDoS attacks? 27 Jul 2015 SearchEnterpriseDesktop Why you should remove local administrator rights once and for all 23 Jul 2015 SearchSecurity Is it time for a DLP system in your enterprise? 26 Jun 2015 SearchSecurity What's the best way to provide Wi-Fi guest network security? 23 Jun 2015 SearchWindowsServer Secure an Office 365 and Exchange hybrid setup 22 Jun 2015 SearchSecurity What's the best way to secure VPN access for teleworkers? 22 Jun 2015 SearchSecurity How can the Misfortune Cookie router vulnerability be avoided? 19 Jun 2015 SearchSecurity State of the Network study: How security tasks are dominating IT staff 19 Jun 2015 SearchSecurity Can eavesdropping over the SS7 protocol be prevented? 19 Jun 2015 SearchWindowsServer What to include in an Exchange Server phishing test 09 Jun 2015 SearchEnterpriseDesktop The desktop administrator's guide to mobile OSes 04 Jun 2015 1 2 3 4 5