News, discussion and expertise on IT Security and the biggest security risks in today’s organizations. Focused on Microsoft Windows and Active Directory Infrastructures we look to address the prevention of security breaches, ensuring regulatory compliance and responding to IT Emergencies.

IT Security

Comments Off on Who Last Accessed, or Attempted to Access your Shared Folders

Who Last Accessed, or Attempted to Access your Shared Folders

Who Last Accessed, or Attempted to Access your Shared Folders

As an important security and compliance measure, watch how you can easily identify activity on your most sensitive shared files and folders. FileAudit not only gives you optimal visibility into what is happening to your organization’s data but the opportunity to react quickly to events.   Video Transcription: In this video, I’m going to show you … Continued

Comments Off on Stronger Access Control Management

Stronger Access Control Management

Stronger Access Control Management

If your Windows network has data that could be of any value to someone without proper authorization to access it, then your organization needs stronger access control. The demand for secure access poses a serious challenge to IT professionals. IT have to balance network security with the need from users for quick and easy access … Continued

Comments Off on How to Monitor File Changes across Windows Servers

How to Monitor File Changes across Windows Servers

How to Monitor File Changes across Windows Servers

Who accessed a particular file share, and what changes happened? If you’re not able to answer this question quickly, you’re not alone. Monitoring file changes is one of the simplest tasks in keeping sensitive data safe but also one of the most neglected areas in many environments. FileAudit addresses this weakness with an easy-to-use reporting … Continued

Comments Off on Force Remote Logoff after Idle Time

Force Remote Logoff after Idle Time

Force Remote Logoff after Idle Time

With UserLock, watch how IT administrators can easily set an automatic forced logoff, on all locked or open machines, after a certain idle time. This can include remote desktop sessions opened by the domain user.     Resolving Optimization and Security Issues Fast and fluid access to shared workstations is key to their utility, but … Continued

Comments Off on Beyond Group Policy to Control Active Directory Accounts

Beyond Group Policy to Control Active Directory Accounts

Beyond Group Policy to Control Active Directory Accounts

With the GDPR (General Data Protection Regulation) now in full force, businesses must protect confidential data from unauthorized access. Strict administration of Active Directory (AD) user accounts is essential and although Group Policy is the tool of choice, processes such as logon and access policies can be tedious to configure and particularly so for SMBs … Continued

, , , Comments Off on Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software When native Windows tools don’t cut it, admins turn to third party software to enhance security and ease regulatory compliance. Although Windows Active Directory includes native policies … Continued

Comments Off on Insider Threat Best Practice – without the need for an SIEM solution

Insider Threat Best Practice – without the need for an SIEM solution

Insider Threat Best Practice – without the need for an SIEM solution

With so much news focusing on external attacks, one of the greatest threats to your organization’s data security, revenue, and reputation is insider threats. Insiders – employees with access to data that is externally valuable – are responsible for 28% of all data breaches. While 28% may not seem as large as the implied 72% … Continued

Comments Off on What lessons can companies learn from getting breached?

What lessons can companies learn from getting breached?

What lessons can companies learn from getting breached?

  In a sense, getting stung can be the key to taking notice — and maybe that’s a blessing in disguise. IT security is a topic often seen as solely the IT department’s concern. For management, the means taken to protect the company from cyber-crime can often be viewed as an extra cost to the … Continued

Comments Off on Cybersecurity advice for Higher Education

Cybersecurity advice for Higher Education

Cybersecurity advice for Higher Education

Information security continues to challenge both large and small institutions alike. According to EDUCAUSE, a nonprofit association of IT leaders in higher education, information security remains the #1 issue in 2018 for the third year in a row. Perhaps this is not a surprise when you learn the education sector has the highest rate of ransomware … Continued

Comments Off on How are Data Breaches Detected

How are Data Breaches Detected

How are Data Breaches Detected

Sometimes the challenge with data breaches is to know they ever happened at all. Take these examples from the 2017 headlines: Company Breach Discovered Breach Occurred Verifone January 2017 mid-2016 Brooks Brothers May 2017 April 2016 – March 2017 California Association of Realtors July 2017 March – May 2017 Forever 21 November 2017 March – … Continued

Secured By miniOrange