Month: November 2015
The Importance of Two Factor Authentication in Information Security
Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel confident of it or sleep soundly at night thinking that everything is secure, they will likely say: Yes, because I/we use complex … Continued
The Actual Disaster Recovery Plan
Part two of a Disaster Recovery process is the actual plan. You have to look at what could go wrong and either eliminate the possibility it would, or at least lower the impacts. So, if you failed to avoid the problem, you have to have a plan to meet it and deal with it. There’s … Continued
4 Business Cases to Support Privileged Identity Management
Privileged Identity Management (PIM) is often dismissed as an exclusively tech priority; after all, making it easier to monitor and support changes within an IT environment has a direct effect on its efficiency and productivity. However, the value of PIM spreads far wider than a single department. In large, established organizations, PIM plays an important … Continued
Windows Event Log Forwarding in Windows Server 2008
I love Active Directory auditing. I love it because with just a couple clicks of the mouse I can easily create a policy that immediately gets applied to 500 servers that begins recording useful information on about everything that goes on involving those servers. What I hate about AD auditing is that this useful information … Continued
GLBA Compliance: A Guide to Securing Customer Data
Financial institutions of all sizes must become familiar with the Financial Services Modernization Act of 1999, better known as the Gramm-Leach-Bliley Act (GLBA), because the consequences of violating it, even inadvertently, can be severe. The GLBA mandates safeguards for companies that process, transfer or store consumer financial information. It prescribes steep penalties for companies that … Continued