News, discussion and expertise on IT Security and the biggest security risks in today’s organizations. Focused on Microsoft Windows and Active Directory Infrastructures we look to address the prevention of security breaches, ensuring regulatory compliance and responding to IT Emergencies.

IT Security

Comments Off on Stop the Frustration and Risk of Unchecked Access to Files and Folders

Stop the Frustration and Risk of Unchecked Access to Files and Folders

Stop the Frustration and Risk of Unchecked Access to Files and Folders

Following the recent updates to FileAudit, we discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data from theft, alteration and loss. Have you ever been asked to find out who moved years of archived PDF files, who deleted important client … Continued

Comments Off on Hybrid Cloud Storage Protection for MSPs

Hybrid Cloud Storage Protection for MSPs

Hybrid Cloud Storage Protection for MSPs

Cyber threats such as ransomware, identity theft, and data exfiltration, which traditionally target on-premise resources are now a growing problem for cloud storage services. As companies continue to deploy resources to the cloud, the need to address these additional security challenges is a major concern. Data security and compliance Everybody knows how the cloud has changed how businesses … Continued

Comments Off on Cyber Liability Insurance and MFA on Internal and Remote Access

Cyber Liability Insurance and MFA on Internal and Remote Access

Cyber Liability Insurance and MFA on Internal and Remote Access

Cyber insurance is driving a long-overdue improvement in user access security. Multi-factor authentication (MFA) is fast becoming a requirement for all privilege and non-privilege accounts, whether users are working on the internal network or remotely. Not a requirement in previous cyber insurance renewals, cyber insurers are demanding firms have MFA. It seems insurers are tired … Continued

Comments Off on Addressing User Access in IT Security Compliance

Addressing User Access in IT Security Compliance

Addressing User Access in IT Security Compliance

The risks of non-compliance are not worth taking. You face fines and even imprisonment — not to mention that non-compliance could lead to a serious data breach that might ultimately lose you clients and damage your reputation. But addressing the murky waters of compliance has never been an easy task, and as regulators add more … Continued

Comments Off on RDP Gateway MFA

RDP Gateway MFA

RDP Gateway MFA

Multi-factor authentication (MFA) for Remote Desktop Gateway and RDP connections should be very high on your security to-do list. Some or even your entire workforce might now be dispersed but their access to company networks still needs to be protected. Here we look at why a second factor of authentication is recommended to protect remote … Continued

Comments Off on Understanding the “After Ransomware” helps MSPs protect against it

Understanding the “After Ransomware” helps MSPs protect against it

Understanding the “After Ransomware” helps MSPs protect against it

Today we have all unfortunately heard about this type of criminal moneymaking scheme. We know – more or less – how to catch it, what happens during the ransomware attack, but we have much less visibility on the ‘after’. It is only by understanding what happens ‘after’, do we quickly realize that the danger is … Continued

Comments Off on Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises continue to rely on Windows domain AD to manage assets, users, systems, policies, profiles, and rights. Even after all these years, the consistency, centralized management, … Continued

Comments Off on Why your VPN connections need two-factor authentication (2FA)

Why your VPN connections need two-factor authentication (2FA)

Why your VPN connections need two-factor authentication (2FA)

Virtual private networks (VPNs) are very popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote machines and your servers, VPNs solve some very important problems. They prevent hackers from finding and entering your servers while allowing your employees to securely access … Continued

Comments Off on Windows Logon Audit Far Beyond Native Windows Security

Windows Logon Audit Far Beyond Native Windows Security

Windows Logon Audit Far Beyond Native Windows Security

  Windows logon auditing is an important activity for diverse security and compliance needs. Businesses may require a full and accurate logon audit to: perform accurate forensics demonstrate they are protecting data from unauthorized access – for regulatory compliance verify the attendance / working hours of any employee monitor specific session types such as remote … Continued

Comments Off on Yubikey 2 Factor Authentication for Windows Domain Logins

Yubikey 2 Factor Authentication for Windows Domain Logins

Yubikey 2 Factor Authentication for Windows Domain Logins

UserLock makes it easy for a business to enable two-factor authentication on Windows domain accounts, managed by on-premise Active Directory. Watch how UserLock works with YubiKey – the hardware security keys manufactured by Yubico. YubiKey offers users an easy and secure second factor of authentication In addition to mobile authentication and Token2, UserLock now partners with Yubico … Continued

Secured By miniOrange