5 Steps to Protect Your Network from Cybercriminals

Unfortunately, 70% of organizations which have established controls to manage changes in their IT infrastructures, bypass security policy requirements and unable to provide preventative actions in time. This increases the risk of data breaches and undermines the viability of companies’ own security policies. In the wave of cyber security breaches, here are five steps to … Continued

IT Auditing Challenges for IT Managers

IT auditing is all about knowing what was changed in your IT infrastructure, who changed it, when and where. This information is vital and should be an integral and ongoing part of any security strategy. Yet, a  Netwrix survey of some 600 IT professionals revealed that 57% of respondents have made undocumented changes to their … Continued

How to Get User Logon Session Times from the Event Log

If you’re a knowledge worker, to be productive in a work environment, you’re probably going to need a user account. And you’re probably going to need to actually use this user account to login to your office and mobile devices. If you don’t, you’re probably not going to be working at that company for too … Continued

Top 10 IT Security Conferences in 2016

One of the best ways for those interested in IT leadership in security to advance their professional skills is to attend world-class conferences. I have put together a list of US IT Security Conferences in 2016 that you might want to attend. These conferences and forums bring together IT vendors, experts and information security professionals for … Continued

Top 5 cybercrime patterns to watch out for in 2016

According to the Chronology of Data Breaches by Privacy Rights Clearinghouse, a nonprofit organization that aims to raise awareness about how technology affects personal privacy, the number of companies that experienced a data breach in 2015 reduced by 44% since 2014. At first glance, it would seem that predictions about 2015 being the “Year of … Continued