
How To Revert Microsoft Outlook Navigation Bar To The Bottom
With The Microsoft Outlook 2207 update, the navigation bar was moved from bottom to left to increase accessibility and provide more customization which allow you to include apps. If you don’t like the change, there is good news, Microsoft added … Read the rest

Is Your Microsoft Exchange Server Vulnerable to ProxyNotShell Flaw?
According to the non-profit Shadowserver Foundation, there are approximately 60,000 IP addresses with internet-facing Microsoft Exchange Server instances still vulnerable to CVE-2022-41082.
This might look like a standard Exchange Server bug, but it’s actually a lot worse. It’s really two … Read the rest

Is Your Website ADA Compliant?
The Americans with Disabilities Act (ADA) is a landmark civil rights law that prohibits discrimination against disabled individuals in all areas of public life. It gives millions of people with disabilities equal access to employment, government, telecommunications, and businesses.
Businesses

How To Migrate UniFi Controller
In this tutorial you will learn how to migrate your UniFi Controller 7.0 to a new UniFi Controller. We are going to use the export site function for the migration. This is the simplest way to migrate your UniFi settings … Read the rest

Black Friday Phishing Scams
Black Friday is approaching, and you should be aware of scams. Thirty percent of people in the US reported receiving phishing messages around Black Friday.
“[N]early a third of U.S. consumers (30%) said they received a phishing email around Black … Read the rest

Microsoft Security, Compliance, and Identity Fundamentals SC-900
I am happy to announce that I achieved my Microsoft Security, Compliance, and Identity Fundamentals SC-900 Certification.
SC-900 is the entry level security exam for a wide array of Microsoft products. I put products there, plural, because SC-900 is more

Cyber Threats For Retail Stores
Cyber attacks on retailers are real and can occur online or offline. Credit card records can be stolen by malicious cyber-intruders. These attackers are able to enter a retail store in person and hack into your systems. Physical access to … Read the rest

Android Malware Infects 20 Million Users
A newly discovered Android malware was confirmed to have infected around 20 million users. The Clicker Malware, used 16 different malicious apps to get into the Google Play Store. Once there, it affected millions of users.
The Clicker Campaign
McAfee … Read the rest

Conduct A ISO 27001 Risk Assessment in 7 Steps
Risk assessments are the most important part of any ISO 27001 project. They help you determine how to get your ISMS in order and keep it that way. This is the core of your information security management system, which is … Read the rest

OAuth application abuse used to gain Exchange Online access
Microsoft researchers recently found a new type of attack. Hackers compromise Exchange Online access with malicious OAuth applications and then use it to change your email settings and spread spam.
OAuth applications are growing in popularity. One of the first … Read the rest