All posts by Patrick Domingues
Is Your Website ADA Compliant?
Businesses with a website must make modifications to accommodate customers with disabilities under ADA Compliance.
How To Migrate UniFi Controller
In this tutorial you will learn how to migrate your UniFi Controller 7.0 to a new UniFi Controller.
Black Friday Phishing Scams
Black Friday is approaching, and you should be aware of scams. Thirty percent of people in the US reported receiving phishing messages around Black Friday. “[N]early a third of U.S. consumers (30%) said they received a phishing email around Black Friday last year, either by email or SMS to their personal email or cell,” the […]
Microsoft Security, Compliance, and Identity Fundamentals SC-900
I am happy to announce that I achieved my Microsoft Security, Compliance, and Identity Fundamentals SC-900 Certification.
Cyber Threats For Retail Stores
Cyber attacks on retailers are real and can occur online or offline. These attackers are able to enter a retail store in person and hack into your systems.
Android Malware Infects 20 Million Users
A newly discovered Android malware was confirmed to have infected around 20 million users. The Clicker Malware, used 16 malicious apps.
Conduct A ISO 27001 Risk Assessment in 7 Steps
Risk assessments are the most important part of any ISO 27001 project. They help you determine how to get your ISMS in order and keep it that way.
OAuth application abuse used to gain Exchange Online access
Microsoft researchers recently found a new type of attack. Hackers compromise Exchange Online access with malicious OAuth applications and then use it to change your email settings and spread spam. OAuth applications are growing in popularity. One of the first malicious uses of OAuth applications is consent phishing. Consent phishing is a particularly sly form […]
How To Create An IT Hurricane Preparedness Plan
Looking to safeguard your IT infrastructure against hurricanes? Learn how to create an IT Hurricane Preparedness Plan that ensures business continuity and data protection.
Hackers Pivoting Around Macro Blocking in Microsoft Office
Hackers Pivoting Around Macro Blocking in Microsoft Office by using file formats such as ISO, RAR, ZIP, and IMG to send malicious documents.