Cyber Security Guides
Find Out how or what
Welcome to our guides section full of what is and how to guides to help you!
Cybersecurity and Information Technology are vast and ever-expanding areas. I can see a time where anyone knows everything about Cyber Security.
As a result of this, there are many times each week when I will come across issues, questions or situations that I have not encountered before. In these situations, I always try to take notes and document what I have done to help others who may encounter the same problems.
So In this section, I will be documenting the two types of guides that I generally keep How to and What is.
-
SC-200 Exam Guide ( & Recertification Guide)
This article will share how I successfully prepared for and passed the SC-200: Microsoft Security Operations Analyst certification exam. It has been two years since I wrote this article, and since then, I’ve passed (just) the SC-200 Microsoft security Operations … Read more
-
Best Cyber security certifications for beginners
Best Cyber security certifications for beginners – NI Cyber Guy Best Cybersecurity Certification for Beginners “What are the best beginners cyber security certifications?” is probably the question that most people I have spoken to ask. Those who are interested in … Read more
-
How Can I Fix an 0x0 0x0 Error Permanently?
If you have found this article, it probably means that you have encountered the 0x0 0x0 error code and are looking to fix it. In that is the case, you’ve found the right place as we’ll cover everything you need … Read more
-
Ways to Check A Website is Legit
Ways to Check if a Website is Legit The internet, like many other technological advances, has made the way we lead our lives much easier. It does however at the same time expose us to many dangers that lurk in … Read more
-
Small Business Cyber Security
What You Need To Know About Small Business Cyber Security It’s critically important for you to protect your business against cyber-attacks, irrespective of whether you’re a bigger company with employees or a sole trader. In this article, we’ll discuss why … Read more
-
How to Spot A Fake Email
7 Essential Tips to Spot a Fake Email Along with the advent of new technologies today, online threats such as cybercrime became prominent. Cybercriminals use email as a platform to continuously do their unlawful activities. Since emails are used for … Read more
-
Blocking Users By Country Using Azure Conditional Access
As many of us will have been reading about and hearing about in the news, online and in our feeds. Due to the situation in eastern Europe at the minute, many governments and their agencies are warning of an increase … Read more
-
Microsoft SC-900 Exam Guide
Exam Prep Guide SC-900: Microsoft Security, Compliance, and Identity Fundamentals Exam from the number of DMs I got when I posted about passing the SC-900 exam on LinkedIn, there are quite a few planning to take the SC-900 exam shortly. So I … Read more
-
Step-by-Step Guide to Easily Cancel a Microsoft Subscription
Need to cancel a Microsoft subscription? Whether you’re reassessing your software needs or ending a trial, our guide provides a simple, straightforward path to help you terminate your Microsoft subscription promptly. Here, you’ll find a step-by-step approach to navigate your … Read more
-
What is Identity and Access Management: A Comprehensive Overview
What is Identity and Access Management (IAM)? It’s the backbone of IT security, a systematic approach that ensures only authorized individuals have the right to access certain information and resources in your organization. In the world where digital threats lurk … Read more
-
Mastering the Azure Hierarchy: A Comprehensive Guide to Organizing Your Cloud Resources
The ‘azure hierarchy’ is the backbone for managing cloud operations, incorporating management groups, subscriptions, resource groups, and individual resources. This article cuts through the complexity, providing you actionable steps on how to organize these components for optimal control over your … Read more
-
Maximizing Security: How Conditional Access Enhances Your Data Protection
What is conditional access and how does it tighten security around your data? In the landscape of cybersecurity, conditional access acts as a dynamic barrier, filtering user access to company resources based on conditions like user location, device compliance, and … Read more
-
Essential Guide to Role-Based Access Control
What is RBAC and how can it secure your organization’s data? Role-Based Access Control (RBAC) is a straightforward approach to managing access across your enterprise, ensuring individuals have only the necessary rights to perform their roles effectively. Our comprehensive guide … Read more
-
Mastering Email Safety: A Simple Guide to Whitelist Domain Office 365
To keep vital emails flowing smoothly to your inbox in Office 365, knowing how to whitelist domain Office 365 is essential. Our guide plainly explains the steps to whitelist domains, securing your email communications from being wrongly caught by spam … Read more
-
Mastering the Kusto Query Language: Your Essential Guide to Powerful Data Analysis
The Kusto Query Language (KQL) stands as a cornerstone of data analytics within the Azure platform. Our guide delves into KQL’s utility for parsing and dissecting structured and semi-structured data across Azure services. You’ll understand how KQL streamlines data analysis, … Read more
-
Encrypting Emails IN Outlook
Looking to encrypt email Outlook? This article delivers a practical roadmap for securing your electronic communications within minutes. You’ll learn not only the steps to encrypt emails but also how to handle certificates and troubleshoot common issues. Secure your Outlook … Read more
-
Schedule an Email Outlook
Need to schedule an email Outlook? Whether you’re planning ahead or managing your time more efficiently, scheduling emails is a key feature of Outlook. In this guide, we dive directly into how to schedule an email Outlook across different platforms, … Read more
-
Recall Email Outlook
Mishaps happen — you click ‘send’ in Outlook and immediately wish you hadn’t. The ‘recall email Outlook’ feature can be your undo button. This article swiftly navigates you through the process for a rapid fix, clarifying when email recall is … Read more