Most Popular Security

Is Syslog Useful?

<Syslog_output> <server> 192.168.1.1</server> </syslog_output> Many people are familiar with the above commands, which are used for forwarding syslog to the syslog server (192.168.1.1). However, do you know how syslog can be helpful? Read on to find out how and see some different use cases for enabling syslog in your infrastructure. The primary use of syslog […]

Read More

Top Five Cyber Threats That Can Kill Your Business Growth

 Top Five Cyber Threats That Can Kill Your Business Growth Neglecting your organization’s cybersecurity can seriously harm your business. Investors quickly lose interest in investing in companies that have been hacked or suffer from other cyberattacks. The revelation of two massive data breaches at Yahoo®, affecting one billion users, threatened to derail the Verizon® offer […]

Read More

Managed File Transfer – Your Answer to Digital Clutter

Managed File Transfer – Your Answer to Digital Clutter Before the digital revolution, paperwork blanketed the business world, kept in filing cabinet after filing cabinet. Today, however, we write, read, and sign documents on our devices, and then use the internet to store and transfer them. Although our desks may be less cluttered with paper, […]

Read More

Log Retention and Compliance

Every organization, at some point, needs to assess their ability to meet regulatory compliance guidelines. Having all network, systems, and security data in check for an audit is a challenge for IT teams. This is primarily because most regulatory standards policies mandate the collection and storage of logs for compliance. PCI DSS: Specifies the retention […]

Read More

Centralized Active Directory Management and Clean-Up

Centralized Active Directory Management and Clean-Up Do you regularly clean up your Active Directory® (AD)? Have you set a weekly, bi-weekly, or monthly schedule, or do you wait until you receive a change request? If you neglect AD cleanup and maintenance, your environment will get cluttered and increasingly difficult to navigate. Accounts become inactive for […]

Read More

How an FTP Server Makes Disaster Recovery Reliable and Secure

Organizations implement disaster recovery (DR) for a number of reasons, some of which include business continuity, data preservation, and regulatory compliance. DR is the process for restoring your systems to a previous fully functional state. However, many people don’t realize that a File Transfer Protocol (FTP) server can help with your organization’s DR efforts. A […]

Read More

Ransomware – Tips to Combat the Threats Enabled From Within

The Wanna Decryptor (aka “WannaCry“) ransomware strain that surfaced over the past couple of weeks, and quickly gained momentum globally, serves as a harsh reminder of the troubles businesses face when putting basic security best practices on the back burner. With software solutions available to handle everything from patch management to more complex functions—such as […]

Read More

How to Handle File Transfer in Secure Networks

In most organizations, regardless of industry, file transfers happen all day, every day. These transfers take place in the forms of data exchanges like email, network shares, homegrown File Transfer Protocol (FTP) tools, and even free online FTP services. Every employee shares information, internally or externally, throughout the day, which raises security concerns. It may […]

Read More

Eye-Opening Discoveries About Help Desk Security and What to Do

It is every customer’s and employee’s right to ask for and receive assistance from the IT help desk. The help desk team is obligated to… help. It is also their sworn duty to maintain the secrecy and confidentiality of any and all privileged information. This means that in addition to providing technical support quickly and […]

Read More