Dear SysAdmin, It’s July 29 and it’s your day! Just take a coffee, some pizza and have fun playing games! Here are some games to distract you from your hard work: Cable Hunt Game Cable Flow Game #VisibilityChallenge Game Enjoy! And happy SysAdmin Day!
Month: July 2016
Azure Active Directory (Azure AD) is a cloud-based directory and identity management service that offers a more streamlined set of services than Windows Server Active Directory. Intended primarily for authenticating users to cloud-born apps (i.e., applications that have been developed to provide cloud services, such as Office 365) Azure AD offers a convenient and cost-effective … Continued
In this day and age, any organization with security on the forefront of their list of operational concerns needs to have an audit policy. Generally, this policy defines the types of log entries that will be monitored, the frequency with which those events will be monitored, and the action plan that will be undertaken in … Continued
Hello guys! We´re happy to announce a new contest for IT folks to celebrate the upcoming SysAdmin Day! Follow these simple rules: Play our #VisibilityChallenge Be one of the top 5 fastest players. Win a $25 Amazon gift card. Remember: Only the 5 fastest participants will win a prize. Stay tuned for an email announcing the winners … Continued
Sometime back, I chronicled one of the most infamous “hacks” that ever happened. A gentleman named Jason Cornish brought the Shionogi Pharmaceutical Company to its knees. In a nutshell, he and his friend saw that things were going bad for them and decided to take revenge. They altered an account to allow themselves access from … Continued
Ransomware is everywhere — that insidious threat that encrypts your precious documents and other files and holds them hostage until you pay a substantial sum to an anonymous third party. Fortunately, there are measures you can take to reduce the likelihood of an attack. Here are three tweaks you can make to mitigate this threat. … Continued
Over the past few years, security professionals have noticed an unusual spike in frequency of insider attacks. Statistically, every organization is potentially exposed to insider threats up to 3 times a year. Companies try to enhance control over its employees’ permissions, third-party actions, and privileged user activity to eliminate risk of cyberattacks. The risk of data theft, … Continued