logo

The Importance of Two Factor Authentication in Information Security

Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel confident of it or sleep soundly at night thinking that everything is secure, they will likely say: Yes, because I/we use complex … Continued

The Actual Disaster Recovery Plan

Part two of a Disaster Recovery process is the actual plan. You have to look at what could go wrong and either eliminate the possibility it would, or at least lower the impacts. So, if you failed to avoid the problem, you have to have a plan to meet it and deal with it. There’s … Continued

4 Business Cases to Support Privileged Identity Management

Privileged Identity Management (PIM) is often dismissed as an exclusively tech priority; after all, making it easier to monitor and support changes within an IT environment has a direct effect on its efficiency and productivity. However, the value of PIM spreads far wider than a single department. In large, established organizations, PIM plays an important … Continued

Windows Event Log Forwarding in Windows Server 2008

I love Active Directory auditing. I love it because with just a couple clicks of the mouse I can easily create a policy that immediately gets applied to 500 servers that begins recording useful information on about everything that goes on involving those servers. What I hate about AD auditing is that this useful information … Continued

GLBA Compliance: A Guide to Securing Customer Data

Financial institutions of all sizes must become familiar with the Financial Services Modernization Act of 1999, better known as the Gramm-Leach-Bliley Act (GLBA), because the consequences of violating it, even inadvertently, can be severe. The GLBA mandates safeguards for companies that process, transfer or store consumer financial information. It prescribes steep penalties for companies that … Continued