News, discussion and expertise on IT Security and the biggest security risks in today’s organizations. Focused on Microsoft Windows and Active Directory Infrastructures we look to address the prevention of security breaches, ensuring regulatory compliance and responding to IT Emergencies.

IT Security

, Comments Off on Half of US organizations reject multi-factor authentication, report finds

Half of US organizations reject multi-factor authentication, report finds

Half of US organizations reject multi-factor authentication, report finds

Nearly half of US organizations do not use multi-factor authentication to protect against compromised credentials, a survey by global IT security vendor IS Decisions finds today, with organizations citing ‘ infrastructure complexity’ (28%) and ‘time needed to manage and oversee’ (18%) as two of the biggest barriers to adoption. The news comes off the back … Continued

, , Comments Off on How UserLock Guards against Shared or Stolen Windows AD Network Logins

How UserLock Guards against Shared or Stolen Windows AD Network Logins

How UserLock Guards against Shared or Stolen Windows AD Network Logins

If you ask your neighbors to watch your house and keep an eye out for any signs of forced entry when you go on holiday, you’re going to miss the burglar who steals your keys and walks right through the front door. The most worrying thing about compromised credentials is that you’re not likely to … Continued

, , Comments Off on Are you sure of your Windows Users claimed identity?

Are you sure of your Windows Users claimed identity?

Are you sure of your Windows Users claimed identity?

Verifying Windows users claimed identity to guard against unauthorized access from stolen or shared credentials. 1. Contextual access controls Contextual access controls can define and restrict network access conditions for each authenticated Windows user. If credentials are compromised, any attempted access outside of these logon rules is automatically blocked. Shared or stolen passwords are therefore unsuccessful … Continued

Comments Off on 6 things you never want to hear a user say….

6 things you never want to hear a user say….

6 things you never want to hear a user say….

It was reported this week that user error accounted for the vast majority of UK security breach incidents. The CERT Insider Threat Center also recently determined that most security incidents initiated through phishing and other social engineering are carried out by acquiring and misusing user credentials to secure systems. The challenge is that users are indeed human. … Continued

, Comments Off on Meeting HIPAA compliance to track and recover lost files.

Meeting HIPAA compliance to track and recover lost files.

Meeting HIPAA compliance to track and recover lost files.

A world-class medical imaging practice chooses FileAudit to track and recover lost files. A medical practice based in New England offers diagnostic services to the medical profession. It has a network of private facilities, staffed by board-certified radiologists, registered technologists, and a team of dedicated staff that offers physicians and patients prompt and professional service. … Continued

Comments Off on Detect and alert on Windows File changes

Detect and alert on Windows File changes

Detect and alert on Windows File changes

Industrial engineers figure out how to do things better. They engineer processes and systems that improve quality and productivity. They work to eliminate waste of time, money, materials, energy and other commodities. In such a highly competitive field, any sensitive data needs to be well protected from potential data breaches. Industrial engineers reacting quickly to … Continued

Comments Off on Why compromised logins are every CIO and CISO’s nightmare!

Why compromised logins are every CIO and CISO’s nightmare!

Why compromised logins are every CIO and CISO’s nightmare!

The real, $940 million risk of sharing credentials or having weak login information! Last week, a federal judge awarded Epic $940 million in damages, $240 million in compensatory damages and $700 million in punitive damages in the suit against Tata. Tata plans to appeal the decision. At the centre of the lawsuit is the unauthorized … Continued

Comments Off on How to Detect Ransomware with FileAudit

How to Detect Ransomware with FileAudit

How to Detect Ransomware with FileAudit

According to the FBI, ransomware – the strain of malware whereby files and folders are locked down by criminals and not released until a ransom is paid – is a growing concern. This, coupled with the new mass access alerts with FileAudit 5, has triggered many questions from both customers and prospects on how to detect … Continued

, Comments Off on Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

For almost four decades, Panama’s Mossack Fonseca law firm has specialised in commercial law, trust service and investor advisory, and was known for its discretion to global elites. However, its recent leak of more than 11 million documents – the biggest data leak in history – only reiterates that law firms can never be too … Continued

, , Comments Off on Protection from Password Sharing

Protection from Password Sharing

Protection from Password Sharing

Employees are arguably the greatest security risk to modern businesses. Though it is often assumed that IT viruses and hackers should be your biggest concern, the reality is that it is your own staff, whether maliciously or accidentally, that are the most likely cause of a breach. But how much do you really know about … Continued

Secured By miniOrange