11 Steps to Insider Threat Mitigation

Have you ever considered that your employees could be putting your organization’s most valuable information assets at risk? This article details key best practices for mitigating insider threats through extended visibility into data activity, systems and users — and offers a solution that can help, without eating up entire IT budget or dragging down system … Continued

Shadow IT: Bring it into the Light [Infographics]

Shadow IT is a growing menace for IT departments worldwide. Take a look at the infographics below to have a better understanding of this threat and how you can minimize your risk. Source: 2016 Netwrix Visibility Survey

7 Ransomware Myths Busted

Of today’s cyber security threats, ransomware is a modern scourge. Even though it has made a number of headlines in the past couple of years, ransomware is still surrounded by myths. Dispelling those myths is one of the key factors of developing an effective information security strategy. Here are the top seven ransomware myths, busted: … Continued

Visibility Tips: Who Has Access to Mailbox?

Most organizations with more than 10 or 20 people on staff that are running either Exchange Server on premises or Office 365 in the cloud have mailboxes that are shared on some level. These scenarios could include the following: An executive or manager that generally handles his own tasks but offers delegated access to his … Continued

Ransomware: Stages, Reasons and First Actions [Infographics]

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. Take a look at the infographics below to have a better understanding of this growing plague and how you can mitigate your risk.  

5 Free Exchange Security Tools You Probably Don’t Know About

Exchange email security is a huge front to defend. There are now so many attack surfaces that it can be hard to decide how to start. Here are a few things that you might want to consider when thinking about your Exchange infrastructure security setup. This is by no means a full list. 1. Full Access … Continued

SysAdmin Magazine: Help! Ransomware Attack!

Ransomware is everywhere — that insidious threat that encrypts your precious documents and other files and holds them hostage until you pay a substantial sum to an anonymous third party. Here is special edition of SysAdmin Magazine that will be your handy guide in fighting  against  ransomware attacks. Contents of August issue of the SysAdmin Magazine: Quick Tweaks to Prevent Ransomware … Continued

Defending Against Crypto-Ransomware Guide

Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware. 1. What is  Crypto-Ransomware Unlike traditional malware, crypto-ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other … Continued