News, discussion and expertise on IT Management. We focus on the specific but important gaps in managing the security of Microsoft Windows and Active Directory Infrastructures.

IT Management

, , , , , , Comments Off on Network security in Universities, Colleges and Schools.

Network security in Universities, Colleges and Schools.

Network security in Universities, Colleges and Schools.

IT teams responsible for network security in Universities, Colleges and Schools are experiencing more and more pressure to secure their networks from both external and insider threats. According to the CSO,13% of data breaches last year happened at educational institutions. According to EDUCAUSE, a nonprofit association of IT leaders in higher education, information security remains the #1 issue in 2018 for the third … Continued

, Comments Off on Nine Steps to better File Auditing

Nine Steps to better File Auditing

Nine Steps to better File Auditing

File auditing helps organizations secure their most sensitive data and simplifies adherence to compliance standards. When successful file auditing is in place it can help both identify a data breach as well as to potentially stop a breach. Attackers are looking for one thing – files Across almost all industries, file servers remain the primary … Continued

Comments Off on Taking a Proactive Approach to Avoid Data Breaches

Taking a Proactive Approach to Avoid Data Breaches

Taking a Proactive Approach to Avoid Data Breaches

  It seems like IT’s general approach to any kind of attack – which includes data breaches – is a reactive one. Think about it, in every kind of attack-related scenario – whether an external attack, an insider threat, malware infection, ransomware attack, etc. – the “business as usual” methodology is to detect the attack/infection … Continued

Comments Off on Does Meeting Compliance Include File Servers?

Does Meeting Compliance Include File Servers?

Does Meeting Compliance Include File Servers?

Those of you reading this are likely working in industries with compliance mandates around protecting specific data types from misuse. And, like most businesses today, you’re probably using some kind of industry-specific set of applications that host that data – a health information management system in a healthcare setting, for example. So, your compliance focus … Continued

Comments Off on Lessons from the NHS: A bitter pill to swallow

Lessons from the NHS: A bitter pill to swallow

Lessons from the NHS: A bitter pill to swallow

The WannaCry cyber-attack, which took place earlier this month, has made headlines all over the world over in recent weeks. Already documented as the biggest ransomware attack in history, the hackers shut down IT systems worldwide, with a staggering 75,000 attacks in 99 countries. However, of those impacted, the organisation which has been given the … Continued

Comments Off on What companies can learn from the alleged Apple hack

What companies can learn from the alleged Apple hack

What companies can learn from the alleged Apple hack

According to a report from Motherboard, a group of hackers is attempting to extort one of the most well-known companies in the world — Apple. The blackmailing is over alleged access to a collection of stolen user credentials for iCloud and other Apple email accounts. The ‘Turkish Crime Family’ hackers have demanded $75,000 in either … Continued

Comments Off on Tracking or restricting overtime with America’s prospective labor laws

Tracking or restricting overtime with America’s prospective labor laws

Tracking or restricting overtime with America’s prospective labor laws

As Barack Obama prepares for retirement, all eyes are on America as its 45th president, Donald Trump, takes over. Before he passed on the baton to his successor, Obama attempted to overhaul legislation surrounding overtime pay. This law would have significantly raised the salary cap under which workers were entitled to earn overtime, meaning the … Continued

, , , , , Comments Off on User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations. If you’re in the legal industry, there is the Law Society’s Lexcel standards. If you handle cardholder data, you’ll have to comply with PCI DSS. And if you work in healthcare, there are guidelines from … Continued

, , , Comments Off on IT manager at a school or university? You’ve got your work cut out for you

IT manager at a school or university? You’ve got your work cut out for you

IT manager at a school or university? You’ve got your work cut out for you

If you’re responsible for IT security at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers and the like from your network; you need to ensure that you protect against students’ own blasé … Continued

, Comments Off on How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued

Secured By miniOrange