Most Popular Security

Pseudonymization vs. Data Masking

You can probably be identified, even from anonymized data. It’s not ideal, but depending on your organization, it might not be disastrous. Let’s explore what can happen if you reveal too much data, as well as what the concept of “too much” data can mean in different contexts. In addition, we’ll also explore how data […]

Read More

Data Tampering: The Quiet Threat

For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however, data tampering has been done with far more serious intent, such as redirecting shipments at sea or capturing financial or sensitive information. And, unfortunately, it’s getting […]

Read More

Is Syslog Useful?

<syslog_output> <server>192.168.1.1</server> </syslog_output> Many people are familiar with the above commands, which are used for forwarding syslog to the syslog server (192.168.1.1). However, do you know how syslog can be helpful? Read on to find out how and see some different use cases for enabling syslog in your infrastructure. The primary use of syslog is […]

Read More

Top Five Cyberthreats That Can Kill Your Business Growth

 Top Five Cyberthreats That Can Kill Your Business Growth Neglecting your organization’s cybersecurity can seriously harm your business. Investors quickly lose interest in investing in companies that have been hacked or suffer from other cyberattacks. The revelation of two massive data breaches at Yahoo®, affecting one billion users, threatened to derail the Verizon® offer to […]

Read More

Managed File Transfer – Your Answer to Digital Clutter

Managed File Transfer – Your Answer to Digital Clutter Before the digital revolution, paperwork blanketed the business world, kept in filing cabinet after filing cabinet. Today, however, we write, read, and sign documents on our devices, and then use the internet to store and transfer them. Although our desks may be less cluttered with paper, […]

Read More

Log Retention and Compliance

At some point, almost every organization needs to assess their ability to meet regulatory compliance guidelines. Having all network, systems, and security data in check for an audit can be a challenge for IT teams. This is primarily because most regulatory standards mandate the collection and storage of logs for compliance. PCI DSS: Specifies the […]

Read More

Centralized Active Directory Management and Clean-Up

Centralized Active Directory Management and Clean-Up Do you regularly clean up your Active Directory® (AD)? Have you set a weekly, bi-weekly, or monthly schedule, or do you wait until you receive a change request? If you neglect AD cleanup and maintenance, your environment will get cluttered and increasingly difficult to navigate. Accounts become inactive for […]

Read More

How an FTP Server Makes Disaster Recovery Reliable and Safe

Organizations implement disaster recovery (DR) for a number of reasons, some of which include business continuity, data preservation, and regulatory compliance. DR is the process for restoring your systems to a previous fully functional state. However, many people don’t realize that a File Transfer Protocol (FTP) server can help with your organization’s DR efforts. A […]

Read More

Ransomware – Tips to Combat the Threats Enabled From Within

The Wanna Decryptor (aka “WannaCry“) ransomware strain that surfaced over the past couple of weeks, and quickly gained momentum globally, serves as a harsh reminder of the troubles businesses face when putting basic security best practices on the back burner. With software solutions available to handle everything from patch management to more complex functions—such as […]

Read More