Access Management
File Security
Compliance
Other
See all insights
October 14th 2020
The principle of least privilege is intended to create an environment that, while providing elevated access, still limits risk.
October 13th 2020
It’s no secret that Active Directory (AD) credentials can easily be compromised. This is the reason why it is absolutely crucial for organizations to secure those credentials to protect against network breaches.
Africa is growing quickly in terms of population, economy, and global influence. Technology adoption continues to rise in Africa. However, with this growing prosperity and digitisation comes new risks and vulnerabilities that could undermine progress.
October 12th 2020
Everyone is familiar with the machinations of the criminal moneymaking scheme that is ransomware. We have much less visibility into and understanding of what happens “after” the attack, however, which has become cyberthieves’ main business.
Active Directory (AD) credentials can easily be stolen. This is why securing those credentials is absolutely crucial for any organization to avoid breaches.
October 6th 2020
Using only a strong user name and password doesn’t cut it anymore. Companies without MFA are wide open to attacks despite the other security solutions they may have in place.
October 1st 2020
The increasing use of cloud storage platforms has changed the way companies work. This is a big opportunity for managed service providers (MSP) and value-added resellers (VAR) and they need to take advantage of it.
September 29th 2020
The cloud has benefited organizations for many years now. But despite all the benefits it brings, suspicion is still present.
September 24th 2020
As you know by now, corporate credentials can be compromised quite easily and represent one of the most dangerous threats to any organization. MFA can help.
September 23rd 2020
The past couple of months have been intense for most companies since they had to shift to working remotely. This situation is unfortunately a huge opportunity for cyber-attackers.
September 22nd 2020
SMBs find it hard to trust a third party with their data because of the lack of visibility and control.
September 21st 2020
Multi-factor authentication (MFA) constitutes one of the most effective controls to prevent unauthorized access. Without MFA in place, all of the other security measures can be bypassed.
September 15th 2020
Let's have a look at the different indicators of compromise and which one is the easiest to observe.
It’s commonly understood that the greatest risk to any organization comes from the insider threat, no matter which industry or sector you work in.
September 9th 2020
Compliance is probably one of the dullest topics in cybersecurity. Let’s be honest, there’s nothing to get excited about because most people view it as a tick-box exercise.
September 8th 2020
External attacks represent 72% of data breaches today. It’s critical for organizations to understand how they can stop them.
September 7th 2020
It is very well known that Active Directory credentials can be compromised quite easily. It is therefore vital for companies to better secure those credentials in order to avoid a network breach.
The sad reality is that organizations that don’t use multi-factor authentication (MFA) are open to attack when their employees share passwords or fall for phishing scams. So, how can you explain the reluctance in adopting MFA?
September 3rd 2020
The truth is, without multi-factor authentication (MFA), businesses are open to attacks if their employees fall for phishing scams or share passwords, which happens much more than you think (yes in your organisation too).
September 2nd 2020
The cloud has been around for many years and has fundamentally changed the way companies do business by opening up a whole new world of employee collaboration and productivity. But SMBs are still doubtful about its security.
July 20th 2020
Windows logon auditing is an important activity for diverse security and compliance needs.
April 23rd 2020
To improve the security of your corporate's network, protect the remote use of AD credentials.
April 14th 2020
The current Covid-19 (Coronavirus) situation all over the world forces companies to change their operating mode from face-to-face to remote work.
November 25th 2019
Just 38 percent use MFA to strengthen network credentials. Why the reluctance in adopting MFA? There are common misconceptions, such as, that a company needs to be a certain size to benefit from MFA.
November 12th 2019
Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?
July 2nd 2019
What exactly are the specific issues SMBs have with data in the cloud?
June 19th 2019
Two thirds (61%) of small- to medium-sized businesses (SMBs) believe that their data is unsafe in the cloud, with almost a third (29%) saying that they have suffered a breach since moving to the cloud for storage.
May 22nd 2019
IT professionals are fighting to secure information, appropriate access and confidentiality. But creating a culture of safe IT practices is not going to be enough.
May 17th 2019
Since moving to the cloud for storage, 29% of SMBs have suffered a breach of files or folders.
May 16th 2019
Almost two-thirds of small- to medium-sized businesses (SMBs) believe that more work needs to be done to protect their data in the cloud.
April 29th 2019
In today’s worlds, organizations are facing the threat of compromise that is ever-present, ever-changing, and ever-gsingleing. The questions is: who and what exactly, are you fighting?
April 28th 2019
Smbs have become a lucrative target because most do not have sufficient defenses in place to protect, detect or react to attacks.
April 3rd 2019
After more than a decade of trying to educate users, IT security professionals still aren't getting their message through.
March 8th 2019
The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are.
Select language:
Business privacy policy - User License Agreement - General conditions
© IS Decisions