Month: August 2018
Privileged Access Management in Windows Server
Many organizations struggle to secure their systems because their Active Directory is already compromised. AD is usually compromised by insiders or successful attacks on them. So how to keep environment protected even when a privileged your account got hacked? Microsoft Windows Server 2016 has many great features to help. Download free guide: Microsoft Windows Server … Continued
Expert Advice: Is CISSP Worth It?
CISSP, which stands for Certified Information Systems Security Professional, is the gold standard for security certifications and an internationally acknowledged benchmark for infosecurity professionals. As you might expect, therefore, becoming a CISSP requires a great deal of time and effort, from studying the Common Body of Knowledge and completing other training to gaining sufficient professional … Continued
Auditing Windows Systems
Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing include: Event Logs and Event Log Forwarding Auditing and Advanced Auditing Audit … Continued
How to Make Your Security Monitoring and Data Discovery Processes GDPR-Compliant
Thanks to the GDPR, the attention of organizations everywhere seems to be focused on the personally identifiable information (PII) that they collect, process and store. Since the GDPR requires protecting the PII of all EU residents, organizations have to be concerned about not just customers, clients and prospects, but their own employees and contractors as … Continued
Hyper-V Security in Windows Server 2016
Administrator accounts work differently in virtualized environments than they do in physical ones. In particular, in a physical environment, administrative roles, such as storage administrator, network administrator, backup operator, and virtualization-host administrator, have limited or isolated rights. In contrast, in a virtual infrastructure, each of these roles with permissions to manage the physical infrastructure might … Continued
[Infographics] Cloud Security Risks in the Financial Sector Explained
There is a lot of ongoing buzz in the media about the attractiveness of cloud technology for financial organizations — and the cybersecurity challenges that come with it. The benefits of cloud use include increased flexibility, agility and cost reduction; in fact, IDC Financial Insights calculates that the biggest global banks will save $15 billion … Continued
Protecting Credentials in Windows Server 2016
Credentials are the keys to an account. By harvesting credentials, attackers can enter your network, move laterally and escalate their privileges to steal your data. Windows Server 2016 has several features for minimizing the chance that attackers will be able to harvest credentials. Handpicked related content: Microsoft Windows Server 2022 Security Using the Protected Users … Continued
How to Calculate Return on Security Investment
During my 20+ year career in IT, I have been involved in projects from many different angles. I have been an end user and a consultant; I have managed technology and I have sold it. But throughout it all, there has been one constant challenge: How to assess the return on investment for a technology … Continued
How to Create an Effective Information Security Risk Management Framework
If you are responsible for corporate information security risk management, we both know your job is tough. Businesses keep generating large volumes of data, IT systems are increasingly complex, and cyber threats continue to evolve. What you have to deal with may sometimes look like an endless number of challenges, and your budget and resources … Continued