News, discussion and expertise on IT Management. We focus on the specific but important gaps in managing the security of Microsoft Windows and Active Directory Infrastructures.

IT Management

Comments Off on Tracking or restricting overtime with America’s prospective labor laws

Tracking or restricting overtime with America’s prospective labor laws

Tracking or restricting overtime with America’s prospective labor laws

As Barack Obama prepares for retirement, all eyes are on America as its 45th president, Donald Trump, takes over. Before he passed on the baton to his successor, Obama attempted to overhaul legislation surrounding overtime pay. This law would have significantly raised the salary cap under which workers were entitled to earn overtime, meaning the … Continued

, , , , , Comments Off on User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations.live streaming movie The Great Wall online If you’re in the legal industry, there is the Law Society’s Lexcel standards. If you handle cardholder data, you’ll have to comply with PCI DSS. And if you work … Continued

, , , Comments Off on IT manager at a school or university? You’ve got your work cut out for you

IT manager at a school or university? You’ve got your work cut out for you

IT manager at a school or university? You’ve got your work cut out for you

If you’re responsible for IT security at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers and the like from your network; you need to ensure that you protect against students’ own blasé … Continued

, Comments Off on How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued

Comments Off on MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

Released today, MeriTalk’s Inside Job. The Federal Insider Threat Report surveyed 150 Federal IT managers on insider threat. The new report examines actions agencies should take to minimize risk and cyber incident consequences. The consequences are real. In the past year, nearly half of Federal agencies were targets of insider threats and nearly one in three (29 percent) … Continued

, , , Comments Off on HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued

, , Comments Off on Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

A division from a well-known government law enforcement agency needed to better track the usage of sensitive files presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and serial sexual assaults, serving over 1,000 employees including civilian members and police officers. Their work supports major investigations … Continued

, Comments Off on From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued

Comments Off on Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The vast majority (86%) of IT professionals consider insider threats to be a purely cultural issue, … Continued

, , , , Comments Off on Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

The IT Team at Oklahoma City Public Schools have a lot on their plate serving approximately 43,000 students over the district. To add to their workload, the team had been facing numerous challenges as a results of students – and staff – sharing their Windows network login. Oklahoma City Public Schools stops users sharing Windows … Continued

Secured By miniOrange