How to Build an Effective Data Classification Policy for Better Information Security

Data classification is a vital component of any information security and compliance program, especially if your organization stores large volumes of information. It’s impossible to maintain proper control if you don’t know what information you have and where it resides, and you can’t ensure the highest level of protection for your most critical assets if … Continued

Regular Expressions for Beginners: How to Get Started Discovering Sensitive Data

Any data discovery and classification solution heavily relies on regular expressions (sometimes called RegExes, REs or RegEx patterns) to identify sensitive data. But what are RegExes and how can they be used to discover sensitive data? Let’s find out. Regular expressions are a small but highly specialized programming language; they are basically wildcards on steroids. … Continued

SysAdmin Magazine: My Precious! – Finding & Securing Sensitive Data

Are you carrying a heavy burden of protecting data from evil powers? The May issue of SysAdmin Magazine is here to accompany you on your journey. Learn how to use the forces of good – data discovery and classification tools and techniques – for safeguarding your most precious content and ensuring compliance. What Is Data Classification? Learn … Continued

Microsoft File Classification Infrastructure (FCI) Explained

Understanding what data you have and where it is located is a critical step in complying with industry and government regulations, like the European Union’s GDPR directive. Microsoft introduced the File Classification Infrastructure (FCI) in Windows Server 2008 R2 to help organizations classify data stored on Windows file servers. Using FCI, system administrators can set … Continued

PowerShell File Management

Every day, sysadmins have to perform various standard operations on the numerous files and folders on their Windows servers. These tasks often include managing users’ data on shared resources and maintaining backups properly. You can use PowerShell to reduce amount of manual work involved. In this article, you will learn how to use PowerShell to: … Continued

CISSP Practice Exam: Free Online Test Questions

Get Ready for the CISSP Exam with a Free Online Quiz The CISSP is a globally recognized certification granted by the International Information System Security Certification Consortium, also known as (ISC)². This certification has become a prerequisite for many careers in information security. The CISSP covers eight broad domains, so it’s no surprise that preparing … Continued

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the 10 most common cyber attack types: Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks Man-in-the-middle (MitM) attack Phishing and spear phishing … Continued

[Infographics] Government’s Rapid Cloud Adoption Lacks Security

The Obama administration’s “Cloud First Initiative” in 2011 gave federal and local agencies the green light to explore cloud services. Both Amazon Web Services and Microsoft Azure immediately provided special offerings targeted at governmental needs, and agencies have been quickly embracing them. According to Fortune, AWS GovCloud has been growing by 221% year over year … Continued

RSA Conference 2018: Top 5 Pieces of Advice for CISOs

As expected, the 27th RSA Conference in April 2018 was one of the major IT security events of the year. 650 exhibitors and 45,000 security professionals came together in San Francisco’s Moscone Center to elaborate on the state of the art and the future of cyber security. Over 500 sessions encompassed a variety of issues, … Continued

Differences Between Share and NTFS Permissions

NTFS and share permissions are both often used in Microsoft Windows environments. While share and NTFS permissions both serve the same purpose — preventing unauthorized access — there are important differences to understand before you determine how to best perform a task like sharing a folder. Here are the key differences between share and NTFS … Continued

Five Reasons to Ditch Manual Data Classification Methods

What is data classification and how hard is it? At first sight, data classification doesn’t look hard. There are four key steps in the process: Entering assets, such as email and electronic documents, in the asset register Classifying each asset according to its sensitivity Labeling the asset based on how it is classified Handling the … Continued