News, discussion and expertise on IT Security and the biggest security risks in today’s organizations. Focused on Microsoft Windows and Active Directory Infrastructures we look to address the prevention of security breaches, ensuring regulatory compliance and responding to IT Emergencies.

IT Security

, Comments Off on Credential Theft in Education. Protect your Institution against a Data Breach.

Credential Theft in Education. Protect your Institution against a Data Breach.

Credential Theft in Education. Protect your Institution against a Data Breach.

Cyber security news site, Dark Reading, recently reported on the news that millions of stolen and fake email credentials from across 300 of the largest universities in the US were available to buy on the Dark Web. The stolen and fake student, faculty and alumni access credentials are being offered to buyers for anywhere from … Continued

Comments Off on The misuse and compromise of any Active Directory users identity

The misuse and compromise of any Active Directory users identity

The misuse and compromise of any Active Directory users identity

Earlier this month, Dark Reading reported that Active Directory mis-management by administrators is currently exposing a whopping 90% of businesses to cyber breaches. The research made by Skyport concluded that should an administrator’s password become compromised, the “blast radius will reach nearly every system in the enterprise“. It’s true — an administrator’s password that falls into the … Continued

Comments Off on Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Microsoft today named the UK as the best country in the world for online security. According to Microsoft’s Digital Civility Index, which measures the “extent of negative civil and personal safety interactions and their consequences”, British adults and children are the least likely out of 14 countries to encounter risk online. That proclamation may be … Continued

Comments Off on Protecting Windows Domain Logon Credentials

Protecting Windows Domain Logon Credentials

Protecting Windows Domain Logon Credentials

Windows domain passwords are not going away any time soon. It’s crucial for enterprises to start taking stock of their password threat exposure. 2016 saw a significant rise in worldwide breaches and data theft and by far the most common attack vendor is the theft of user credentials. Fully 91% of attacks begin with a phishing … Continued

, Comments Off on Spoiling some of Hollywood and TV’s finest hacking scenes

Spoiling some of Hollywood and TV’s finest hacking scenes

Spoiling some of Hollywood and TV’s finest hacking scenes

Have you ever been watching a hacking scene in a film and thought “that would never happen in real life?” or “that hack is way too far-fetched to be credible”? Whether it’s a scene where an attacker gains access to a complex network using the most ridiculously simple password they’ve stolen, or a scene where … Continued

, Comments Off on The Three hack. Take control to stop a breach using an employee login

The Three hack. Take control to stop a breach using an employee login

The Three hack. Take control to stop a breach using an employee login

UK telecoms company Three confirmed news of the security breach on Thursday, revealing that hackers accessed its systems using an employee login, potentially putting the personal data of six million customers at risk. This is the umpteenth time a major company has suffered a data breach as a result of an employee login falling into the wrong … Continued

, , , Comments Off on Context-Aware Security Leaves Leaked Employee Passwords Useless

Context-Aware Security Leaves Leaked Employee Passwords Useless

Context-Aware Security Leaves Leaked Employee Passwords Useless

At 221 of the leading Fortune 500 companies, employees’ credentials are posted publicy online for hackers to steal and reuse in cyberattacks. This research is just one of many stories we see every year about how leaked employee passwords leave companies vulnerable to hackers who can use the data to break into networks or mount … Continued

, , Comments Off on Active Directory User Logon Logoff Security

Active Directory User Logon Logoff Security

Active Directory User Logon Logoff Security

So you want to control Active Directory (AD) user access in a more granular way than native Windows’ Group Policy? You want to restrict users from accessing the network based on criteria you specify? And you want to be alerted to any other suspicious logon activity – crucially before that activity becomes a serious problem? Your absolutely right. This type of logon/logoff security is no longer … Continued

, , , Comments Off on Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software Although Windows Active Directory includes native policies to audit file changes, admins turn to third party software to enhance security and ease regulatory compliance. As an agentless solution, … Continued

, Comments Off on Half of US organizations reject multi-factor authentication, report finds

Half of US organizations reject multi-factor authentication, report finds

Half of US organizations reject multi-factor authentication, report finds

Nearly half of US organizations do not use multi-factor authentication to protect against compromised credentials, a survey by global IT security vendor IS Decisions finds today, with organizations citing ‘ infrastructure complexity’ (28%) and ‘time needed to manage and oversee’ (18%) as two of the biggest barriers to adoption. The news comes off the back … Continued

Secured By miniOrange