Month: May 2016
ROI Calculator: Evaluate Efficiency of Investment in Security Software
Every business leadership team wants to see a return on its investments. From hiring valuable employees who deliver on projects to securing resources that allow those employees to do their jobs, every cost needs to have a purpose — and investing in security software is no different. Why does any IT department need ROI evaluation? IT … Continued
How to Detect Changes to OUs in Active Directory
Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory can turn into pain in the neck for IT admins. For instance, if an OU that contains “User Accounts” is deleted, users will not be able to log in. There could be multiple scenarios like that… This how-to will show you two … Continued
Top Five Security Trends to Watch
During the last 8 years IT industry hot topics were data governance, network monitoring, threat detection, virtualization, new cost-effective approaches to infrastructure management, backup and disaster recovery solutions and identity governance solutions. However, there’s a new set of IT priorities around security issues that are rising quickly to the top. IT vendors need to consider … Continued
4 Steps to a Secure Active Directory Administration Model
Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator accounts hold the keys to your kingdom, and once compromised you can … Continued
How to Escape Data Tampering Nightmare
Earlier this year Admiral Michael Rogers, head of the NSA and the US Cyber Command, talked about the key ‘three things that keep him awake at night’ The first two are the fear of online attacks against US critical infrastructure and non-state terrorist groups changing how they use online resources. These threats were to be expected … Continued
Ransomware Strike Game
Disgusting ransomware is everywhere!
Cable Flow Game
Pair up all matching sockets with a cord and cover the entire board to solve this puzzle.
Cable Hunt Game
Try to connect the cables and the hubs according to the color.
Complete Visibility Game
Be quick and generate the report your boss wants but be careful not to mess up!
RAM Check Game
Find out how large your mental RAM capacity is!
May the Force Be with You: Best Tools for IT Pros and Geeks
May the 4th be with you, brave IT pros, geeks and nerds. It’s our day! We’ve collected useful materials to arm you with powerful tools and guides that are designed to help IT Pros gain visibility into their hybrid-cloud IT environments for security and compliance. Free Tools for IT Pros Change Notifier for Active Directory This tool emails … Continued