Happy SysAdmin Day 2016!

Dear SysAdmin, It’s July 29 and it’s your day! Just take a coffee, some pizza and have fun playing games! Here are some games to distract you from your hard work: Cable Hunt Game Cable Flow Game #VisibilityChallenge Game Enjoy! And happy SysAdmin Day!  

3 Ways Azure Active Directory Improves Security

Azure Active Directory (Azure AD) is a cloud-based directory and identity management service that offers a more streamlined set of services than Windows Server Active Directory. Intended primarily for authenticating users to cloud-born apps (i.e., applications that have been developed to provide cloud services, such as Office 365) Azure AD offers a convenient and cost-effective … Continued

Top 4 Security Log Events to Audit

In this day and age, any organization with security on the forefront of their list of operational concerns needs to have an audit policy. Generally, this policy defines the types of log entries that will be monitored, the frequency with which those events will be monitored, and the action plan that will be undertaken in … Continued

SysAdmin Day 2016: #VisibilityChallenge Game

Hello guys! We´re happy to announce a new contest for IT folks to celebrate the upcoming SysAdmin Day! Follow these simple rules: Play our #VisibilityChallenge Be one of the top 5 fastest players. Win a $25 Amazon gift card. Remember: Only the 5 fastest participants will win a prize. Stay tuned for an email announcing the winners … Continued

3 Quick Tweaks to Prevent Ransomware Attacks

Ransomware is everywhere — that insidious threat that encrypts your precious documents and other files and holds them hostage until you pay a substantial sum to an anonymous third party. Fortunately, there are measures you can take to reduce the likelihood of an attack. Here are three tweaks you can make to mitigate this threat. … Continued

SysAdmin Magazine: Insider Threat

Over the past few years, security professionals have noticed an unusual spike in frequency of insider attacks. Statistically, every organization is potentially exposed to insider threats up to 3 times a year. Companies try to enhance control over its employees’ permissions, third-party actions, and privileged user activity to eliminate risk of cyberattacks. The risk of data theft, … Continued