Attack simulation training – part 2
Welcome to part 2 – Mr. Malware opened the email Last we left off; Mr. Malware Link (ML) received the
Read moreWelcome to part 2 – Mr. Malware opened the email Last we left off; Mr. Malware Link (ML) received the
Read moreWelcome to part 1 In my introduction to this series, I stressed the importance of training and testing users. I
Read moreIn the world of technology, security should be number one on everyone’s mind. At the very least, every business should
Read moreFrom PowerShell: Pick an account: Once authenticated you can close the browser window and return to PowerShell. When finished, disconnect:
Read moreTo get a device’s hardware Hash (Hardware ID), run the following commands in Powershell or save as .ps1. Note: In Windows
Read moreFind all mailboxes and users with full access.
Read moreThis is very handy. This is a big help when merging tenants. This should be easier but there is no
Read moreEarlier, I logged in to my tenant and noticed that a couple of users that I had created yesterday on
Read more