Tag: Exchange Server audit
April 20, 2016 |
4 Rules to Enhance Email Security in the Cloud
The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
November 11, 2013 |
Best Practices for Change Management in the Data Center
When it comes to change management, Scott Matteson gets it. Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of individual accounts to perform changes so that Auditing of system changes can easily be tied back to...
November 7, 2013 |
Death by Event Log Overload
When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs.
So, if companies today already have all necessary data that points...
July 25, 2013 |
Top 10 Systems that All Organizations Need to Audit but Often Don’t (part #1)
Ask an IT manager to tell you who made what changes to system configurations in their IT infrastructure and it will often involve a time-consuming manual process of trawling through a disparate array of native audit logs from servers and network equipment. Despite being slow and insecure this...
June 6, 2011 |
Case Study: Eclipse Group Automates Infrastructure Change Auditing for Increased Security
With over 200 IT pros serving a wide variety of business needs, Eclipse Group offers a broad range of IT services and systems geared toward providing top-quality application development, infrastructure management, disaster recovery, risk management, modernization and more for IT departments across...
September 12, 2010 |
Key Strategies for Simplified Exchange 2010 Auditing
For a moment, think of how you would feel about a stranger rifling through your house, opening up bills and examining your personal life? If not for obvious footprints left behind within the confined area, would you even know that a break-in occurred?
Now consider the value of your exchange...