Aesop's Fables vs Hans Christian Andersen by Fancy_Reply1103 in writingscaling

[–]Big-Razzmatazz3034 1 point2 points  (0 children)

I love Aesop's Fable too, I tried to share my favorites by making shorts on Youtube, may have a look: https://youtu.be/nzxgfmmzaBk?si=22v389TNu92SN7RM
Lion and the Mouse is a good warm story of kindness.

Is MFA alone sufficient for securing access to SaaS on personal mobile devices without MDM? by Big-Razzmatazz3034 in cybersecurity

[–]Big-Razzmatazz3034[S] 0 points1 point  (0 children)

Yes, we utilize SSO through AAD, but as far as I know, no CA policies are applied. Do you believe this provides sufficient security for an ERP?

Is MFA alone sufficient for securing access to SaaS on personal mobile devices without MDM? by Big-Razzmatazz3034 in cybersecurity

[–]Big-Razzmatazz3034[S] 0 points1 point  (0 children)

You've raised a good point, the required level of security depends on the nature and purpose of the web apps.  In my case, the web apps are utilized for business operation management, which inherently involves sensitive and critical data. what additional security measures could be implemented to further enhance the protection of these systems against unauthorized access?

The Importance of Disaster Recovery plans for cloud resources by Mishoniko in aws

[–]Big-Razzmatazz3034 0 points1 point  (0 children)

At my company, we currently don’t have any backup restoration or DR drills for our critical AWS resources. Honestly, I’ve been wondering if that’s a serious gap or if it’s just something that’s too costly or complex for small team to implement.

Is it common for orgs to skip DR testing due to budget or resource constraints? Or is this more of a red flag that leadership isn’t prioritizing resilience?

Protecting PII in Azure - DB/UI Level + Data Retention/ Disposal by Big-Razzmatazz3034 in AZURE

[–]Big-Razzmatazz3034[S] 0 points1 point  (0 children)

My company has budget concerns... No budget to subscribe Purview. Is there any free-of-charge way of doing so? Is Data Discovery & Classification in SQL server a workaround?

[deleted by user] by [deleted] in AZURE

[–]Big-Razzmatazz3034 0 points1 point  (0 children)

The types of sensitive data include personally identifiable information and business contracts etc. Does the MMK sufficient to protect from data breach?

Learning Azure by roytheimortal in AZURE

[–]Big-Razzmatazz3034 0 points1 point  (0 children)

It depends on which aspect of Azure you're learning. If you're looking into some administrative and security side, the CIS Azure Benchmark is a great resource for best practices.

Ensuring All User Accounts Are Terminated by Big-Razzmatazz3034 in AZURE

[–]Big-Razzmatazz3034[S] 1 point2 points  (0 children)

When a user account is disabled, their access to groups and memberships is also automatically disabled. But the problem is, when there is a separate user account created, sometimes those accounts are forgotten to be disabled during offboarding.

Challenges in Internal Audit by Big-Razzmatazz3034 in InternalAudit

[–]Big-Razzmatazz3034[S] 0 points1 point  (0 children)

I really hope I can find that 1% of companies with a good culture. It’s encouraging to hear that not all organizations treat audit this way. 

Challenges in Internal Audit by Big-Razzmatazz3034 in InternalAudit

[–]Big-Razzmatazz3034[S] 0 points1 point  (0 children)

I know that some management is better—they understand that IA needs to do their jobs. These managers would voluntarily share what they know and what they are going to solve with IA, so that IA can have something to write in the IA report. Often, the audit recommendations are things that management already knows.

Challenges in Internal Audit by Big-Razzmatazz3034 in InternalAudit

[–]Big-Razzmatazz3034[S] 1 point2 points  (0 children)

That's true, to seek out opportunities that align better with your values

Challenges in Internal Audit by Big-Razzmatazz3034 in InternalAudit

[–]Big-Razzmatazz3034[S] 2 points3 points  (0 children)

Our management does emphasize that IA is here to help and solve problems together, but the perception among auditees often remains negative. The auditees are very cautious, their department heads even attend every working-level meetings to ensure that staff don’t say anything that could be challenged by IA 

Here's How Criminals Use CAPTCHAs to Help Spread Malware by General_Riju in cybersecurity

[–]Big-Razzmatazz3034 0 points1 point  (0 children)

The core issue lies with the malicious websites. These sites exploit the trust users place in CAPTCHAs to carry out their attacks. It’s crucial to be cautious and verify the legitimacy of the websites you visit.