logo

5 Initiatives to Enhance Security Awareness in Organization

Some time ago there was a big discussion on Spiceworks about FedEx data leakage. Roughly 5 GBs of data was going from it daily to an IP address in Bulgaria.  Since a third-party actually owned the system, they were somewhat limited in what they could do and was wondering what to do next. Most of … Continued

Exchange Best Practices: How to Detect Who Accessed Another User’s Mailbox

Using shared mailboxes in Office 365 can facilitate communication in team projects. However, giving multiple users access permissions for the same mailbox increases the risk of security incidents and leaks of sensitive data. Non-owners with access rights can, unintentionally or maliciously, forward a message, move an e-mail with sensitive content to another location, or — … Continued

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent from “the boss”. While the … Continued

Keyboard Shortcuts for System Administrators

I have been in the IT business since the early days of DOS.  In order to navigate the archaic operating systems back in the day, you had to learn a lot of keyboard shortcuts.  Most people these days are content to use a mouse to navigate, but there are still many valuable shortcuts that can … Continued

What You Need to Know About Cloud Storage Security Breaches

As more and more companies join Netflix, Pinterest, and Apple in moving to the cloud, hackers – and a healthy dose of user error – are making these large sources of sensitive information more sensitive to breach. Recent breaches affecting Dropbox and Google Drive show that this new generation of storage solutions have yet to … Continued

FAQ: What’s new in Netwrix Auditor 8.0

Today Netwrix has introduced its major release of Netwrix Auditor 8.0.  New Netwrix Auditor provides complete visibility into hybrid cloud IT infrastructures to protect corporate data at rest regardless of its location. The new version of company’s leading IT auditing platform simplifies detection of security threats and enables organizations to gain rigorous control over critical data … Continued

Ransomware Protection Using FSRM and PowerShell

While the FBI continues to investigate the MedStar attacks and a series of other recent ransomware attacks, I decided to describe a case from my own experience when I received an encrypted file and opened it. What steps should I have been undertaking to protect my system from file-encrypting malware? Background Well, I received an … Continued

Group Policy for Password Monitoring

As an administrator, you have to ensure that your network is secure.  A big part of that includes deciding on a password strategy for user accounts and administrator accounts.  You can educate your users on best practices for password creation but you can also enable policies that force users to adhere to the best practices.  … Continued