News, discussion and expertise on IT Security and the biggest security risks in today’s organizations. Focused on Microsoft Windows and Active Directory Infrastructures we look to address the prevention of security breaches, ensuring regulatory compliance and responding to IT Emergencies.

IT Security

Comments Off on Multi Factor Authentication for Remote Desktop Gateway and RDP Connections

Multi Factor Authentication for Remote Desktop Gateway and RDP Connections

Multi Factor Authentication for Remote Desktop Gateway and RDP Connections

Some or even your entire workforce might now be dispersed but their access to company networks still needs to be protected. Here we look at why a second factor of authentication is recommended to protect remote access. RDP Connections The Microsoft Remote Desktop Protocol (also known as RDP) is used to allow remote desktop to … Continued

Comments Off on Understanding the “After Ransomware” helps MSPs protect against it

Understanding the “After Ransomware” helps MSPs protect against it

Understanding the “After Ransomware” helps MSPs protect against it

Today we have all unfortunately heard about this type of criminal moneymaking scheme. We know – more or less – how to catch it, what happens during the ransomware attack, but we have much less visibility on the ‘after’. It is only by understanding what happens ‘after’, do we quickly realize that the danger is … Continued

Comments Off on Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises continue to rely on Windows domain AD to manage assets, users, systems, policies, profiles, and rights. Even after all these years, the consistency, centralized management, … Continued

Comments Off on Why your VPN connections need two-factor authentication (2FA)

Why your VPN connections need two-factor authentication (2FA)

Why your VPN connections need two-factor authentication (2FA)

Virtual private networks (VPNs) are very popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote machines and your servers, VPNs solve some very important problems. They prevent hackers from finding and entering your servers while allowing your employees to securely access … Continued

Comments Off on Windows Logon Audit Far Beyond Native Windows Security

Windows Logon Audit Far Beyond Native Windows Security

Windows Logon Audit Far Beyond Native Windows Security

  Windows logon auditing is an important activity for diverse security and compliance needs. Businesses may require a full and accurate logon audit to: perform accurate forensics demonstrate they are protecting data from unauthorized access – for regulatory compliance verify the attendance / working hours of any employee monitor specific session types such as remote … Continued

Comments Off on Yubikey 2 Factor Authentication for Windows Logins

Yubikey 2 Factor Authentication for Windows Logins

Yubikey 2 Factor Authentication for Windows Logins

UserLock makes it easy for a business to enable two-factor authentication on Windows accounts, managed by Active Directory. Watch how UserLock works with YubiKey – the hardware security keys manufactured by Yubico. YubiKey offers users an easy and secure second factor of authentication In addition to mobile authentication and Token2, UserLock now partners with Yubico to offer … Continued

Comments Off on Windows File Auditing Log and more with FileAudit

Windows File Auditing Log and more with FileAudit

Windows File Auditing Log and more with FileAudit

FileAudit is an intuitive tool that simplifies native Windows file auditing log. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day Trial Download of FileAudit FileAudit goes further than just logs and information. It protects data, … Continued

Comments Off on Protecting Active Directory logins for remote working

Protecting Active Directory logins for remote working

Protecting Active Directory logins for remote working

  The boom in working from home has become a bonanza for cyber attackers. Each time an employee connects to the corporate network from their home they create an access point that can often be exploited. With Windows Active Directory (AD) still being the core identity and access platform for businesses around the world, the … Continued

Comments Off on Login Logout Time Tracking for Employees

Login Logout Time Tracking for Employees

Login Logout Time Tracking for Employees

With more and more organizations allowing flexible work hours and users working remotely, it is increasingly important to be able to manage and monitor employee’s working hours.  Being able to track not only login and logout times, but lock and unlock activities a manager can obtain an accurate view of how their employees spend time … Continued

Comments Off on Secure Active Directory Users’ Accounts

Secure Active Directory Users’ Accounts

Secure Active Directory Users’ Accounts

Users are most of the time the weakest link in your organization. But you need to stop blaming them. It’s your job to secure the organization from unwanted access. You need to protect them from their own careless behavior and mitigate against any malicious activity. In order to do that, you need to make sure … Continued

Secured By miniOrange