logo

ROI Calculator: Evaluate Efficiency of Investment in Security Software

Every business leadership team wants to see a return on its investments. From hiring valuable employees who deliver on projects to securing resources that allow those employees to do their jobs, every cost needs to have a purpose — and investing in security software is no different. Why does any IT department need ROI evaluation? IT … Continued

How to Detect Changes to OUs in Active Directory

Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory can turn into pain in the neck for IT admins. For instance, if an OU that contains “User Accounts” is deleted, users will not be able to log in. There could be multiple scenarios like that… This how-to will show you two … Continued

Top Five Security Trends to Watch

During the last 8 years IT industry hot topics were data governance, network monitoring, threat detection, virtualization, new cost-effective approaches to infrastructure management, backup and disaster recovery solutions and identity governance solutions. However, there’s a new set of IT priorities around security issues that are rising quickly to the top. IT vendors need to consider … Continued

4 Steps to a Secure Active Directory Administration Model

Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator accounts hold the keys to your kingdom, and once compromised you can … Continued

How to Escape Data Tampering Nightmare

Earlier this year Admiral Michael Rogers, head of the NSA and the US Cyber Command, talked about the key ‘three things that keep him awake at night’ The first two are the fear of online attacks against US critical infrastructure and non-state terrorist groups changing how they use online resources. These threats were to be expected … Continued

Ransomware Strike Game

Disgusting ransomware is everywhere!

Cable Flow Game

Pair up all matching sockets with a cord and cover the entire board to solve this puzzle.

Cable Hunt Game

Try to connect the cables and the hubs according to the color.

Complete Visibility Game

Be quick and generate the report your boss wants but be careful not to mess up!

RAM Check Game

Find out how large your mental RAM capacity is!

May the Force Be with You: Best Tools for IT Pros and Geeks

May the 4th be with you,  brave IT pros, geeks and nerds. It’s our day! We’ve collected useful materials to arm you with powerful tools and guides that are designed to help IT Pros gain visibility into their hybrid-cloud IT environments for security and compliance. Free Tools for IT Pros Change Notifier for Active Directory This tool emails … Continued