8 Ways to Harden Office365 Environment

Tweet This We have all started using hosted email and other cloud based applications in the IT realm. With Office365 there are a few things to consider doing to help harden and better secure your Office365 platform. 1. Turn off PowerShell access for all users except...

The Roundup – March

Tweet This APRIL 2, 2020 | ISSUE NO. 2   The Roundup is a bit-sized security newsletter designed to be read during boring meetings while providing you with material to share during your next sales lunch. Zoom Meeting Security Best Practices As the workforce moves...

Attackers Use Texts to Exploit COVID-19

Executive Summary Zyston has noted an increase in cyber attacks in since the COVID-19 outbreak began spreading across the world. Recently, Zyston associates have noted threat actors using text messages to try to trick individuals. Zyston has noted three particular...

Zoom Meeting Security Best Practices

Before the Meeting Set a password for your meeting to ensure only those invited can attend. Disable Join Before Host to ensure only the Host can start and control the meeting. Settings > Schedule Meeting > Join Before Host Create a Waiting Room by enabling the...

COVID-19 Threat Intelligence Report

Click to download the pdf copy of the report. Executive Summary In response to the global COVID-19 outbreak, many organizations are temporarily moving to remote work. A majority of these firms are not equipped for remote work, but they are being forced into it without...