Most Popular Security

Log Retention and Compliance

At some point, almost every organization needs to assess their ability to meet regulatory compliance guidelines. Having all network, systems, and security data in check for an audit can be a challenge for IT teams. This is primarily because most regulatory standards mandate the collection and storage of logs for compliance. PCI DSS: Specifies the […]

Read More

Centralized Active Directory Management and Clean-Up

Do you regularly clean up your Active Directory® (AD)? Have you set a weekly, bi-weekly, or monthly schedule, or do you wait until you receive a change request? If you neglect AD cleanup and maintenance, your environment will get cluttered and increasingly difficult to navigate. Accounts become inactive for a variety of reasons, such as […]

Read More

How an FTP Server Makes Disaster Recovery Reliable and Safe

Organizations implement disaster recovery (DR) for a number of reasons, some of which include business continuity, data preservation, and regulatory compliance. DR is the process for restoring your systems to a previous fully functional state. However, many people don’t realize that a File Transfer Protocol (FTP) server can help with your organization’s DR efforts. A […]

Read More

Ransomware – Tips to Combat the Threats Enabled From Within

The Wanna Decryptor (aka “WannaCry“) ransomware strain that surfaced over the past couple of weeks, and quickly gained momentum globally, serves as a harsh reminder of the troubles businesses face when putting basic security best practices on the back burner. With software solutions available to handle everything from patch management to more complex functions—such as […]

Read More

How to Handle File Transfer in Secure Networks

In most organizations, regardless of industry, file transfers happen all day, every day. These transfers take place in the forms of data exchanges like email, network shares, homegrown File Transfer Protocol (FTP) tools, and even free online FTP services. Every employee shares information, internally or externally, throughout the day, which raises security concerns. It may […]

Read More

Eye-Opening Discoveries About Help Desk Security and What to Do

It’s every customer and employee’s right to ask for and receive assistance from the IT help desk. The help desk team is obligated to, well, help. It is also their duty to maintain the secrecy and confidentiality of any and all privileged information. This means that in addition to providing technical support quickly and efficiently, […]

Read More

Your Help Desk Can Be a Powerful Ally in Maintaining HIPAA Compliance

Each industry has standards and regulatory compliance concerns. The health care industry arguably has the most well-known, thanks to the Health Insurance and Portability Accountability Act (HIPAA) and its efforts to keep electronic protected health information (ePHI) safe. HIPAA compliance is essential for organizations that store, maintain or transmit ePHI and staying on top of […]

Read More

Is Threat Intelligence For Me?

“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber, but still, a lot of these hits apply, and you can see why at the RSA conference.  There are many forms of threat intelligence with […]

Read More

All Data is Not Created Equal

“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider spending more time protecting the vast bytes that make up your corporate data. As an IT or security professional, do you know how much data […]

Read More

How to Prevent the Cost of a Data Breach from SQL Injection Attacks

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top reasons for this exorbitant sum. Hackers attack websites to gather commercial information, consumer information, or targeted profiles. Data breach attempts need to be thwarted quickly. […]

Read More