News, discussion and expertise on IT Management. We focus on the specific but important gaps in managing the security of Microsoft Windows and Active Directory Infrastructures.

IT Management

, , , , , Comments Off on User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations. If you’re in the legal industry, there is the Law Society’s Lexcel standards. If you handle cardholder data, you’ll have to comply with PCI DSS. And if you work in healthcare, there are guidelines from … Continued

, Comments Off on How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued

Comments Off on MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

Released today, MeriTalk’s Inside Job. The Federal Insider Threat Report surveyed 150 Federal IT managers on insider threat. The new report examines actions agencies should take to minimize risk and cyber incident consequences. The consequences are real. In the past year, nearly half of Federal agencies were targets of insider threats and nearly one in three (29 percent) … Continued

, , , Comments Off on HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued

, , Comments Off on Monitor Folder Changes in Windows – A Case Study

Monitor Folder Changes in Windows – A Case Study

Monitor Folder Changes in Windows – A Case Study

Being able to monitor folder changes on Windows servers is important for legal companies. A division from a well-known government law enforcement agency needed to better monitor and track the changes of sensitive files and folders presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and … Continued

, Comments Off on From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued

Comments Off on Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The vast majority (86%) of IT professionals consider insider threats to be a purely cultural issue, … Continued

, , , , Comments Off on Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

The IT Team at Oklahoma City Public Schools have a lot on their plate serving approximately 43,000 students over the district. To add to their workload, the team had been facing numerous challenges as a results of students – and staff – sharing their Windows network login. Oklahoma City Public Schools stops users sharing Windows … Continued

, , , Comments Off on HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

HIPAA & Network Security for Windows Active Directory

Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued

, , , Comments Off on How to Track File Access in Windows – A Case-Study

How to Track File Access in Windows – A Case-Study

How to Track File Access in Windows – A Case-Study

Does your organization need to track file access? Do you need to monitor employee access to certain or all corporate files? With a wealth of information stored on file servers and document management systems, there is a need to track file access to protect organizations against malicious insiders with authorized access that are looking to … Continued

Secured By miniOrange