M365 implementations are common among organisations of varying sizes. We have recently completed an engagement to review the security configurations of one and decided to create a review framework. This post covers five key configurations that kickstart the security configuration of your M365.
Author: Axenic Team
What is the difference between masking and truncation?
We have come across a number of scenarios recently where there seems to be a bit of confusion between masking and truncation and when to use which one. The following update from the Axenic PCI department should help clear things up.
Information Security Management Systems – It’s all about the Business!
Using Logical Trust Domains to understand DNSSEC
Privacy Breaches – Carrot or Stick?
Interesting article in the NY Times here
It discusses the loss of an unencrypted laptop by a NASA employee that contained the confidential details of 10,000 employees including names, birth dates, social security numbers and, in some cases, personal information from background checks.