logo
October 20, 2020 | Ryan Brooks

Data Security Explained: Definition, Concerns and Technologies

More than ever, digital data security is on the agenda in many organizations. The focus on protection of sensitive or critical data, such as intellectual property and personal data, is a result of growing cyber risks and increasingly stringent data security regulations. Today, protecting...
October 20, 2020 | Brian Svidergol

What is the Principle of Least Access?

In this blog post, we will explain the principle of least privilege (POLP), provide the definition and use cases, and explain the importance of the principle. Like many other security principles and concepts, this principle is one part of a larger security strategy that aims at mitigating the risk...
October 20, 2020 | Ryan Brooks

The CIA Triangle and Its Real-World Application

What is the CIA triad? Information security revolves around the three key principles:  confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
March 26, 2020 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
October 2, 2020 | Matt Middleton-Leal

Top 5 Human Errors that Impact Data Security

Tighter data protection regulations have forced businesses to put data security at the top of their priority list. However most companies still lack a strong cybersecurity culture among their employees. In fact, a recent paper by Osterman Research reports that less than half (42%) of organizations...
March 22, 2019 | Jeff Melnick

Understanding SharePoint Permissions

The Purpose of SharePoint Permissions SharePoint permissions control the access that employees, partners, third-party suppliers and others have to your SharePoint content. You can choose who can read specific information and who cannot. SharePoint permissions extend not only to display data in...
March 3, 2020 | Jeff Melnick

Differences Between Share and NTFS Permissions

NTFS and share permissions are both often used in Microsoft Windows environments. While share and NTFS permissions both serve the same purpose — preventing unauthorized access — there are important differences to understand before you determine how to best perform a task like sharing a folder....
July 2, 2020 | Russell Smith

Secure Privileged Access with ESAE Model

Ensuring that systems are patched and that defense-in-depth security protections are working effectively, top the list of concerns for IT departments. But despite these efforts, security breaches are still on the rise because operational issues are commonly ignored. Best practice dictates that...
August 3, 2020 | Oleg Lalaev

Top 5 Free Tools for NTFS Permissions Reporting

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few free tools that will help you save time on this report generation and export all permissions granted to a user account on a file share...
October 17, 2018 | Larry Glusman

RemoteApp: Remote Access Tool to Simplify a Sysadmin Life

What is RemoteApp? Are you using your Terminal Server/RDS Server for one main application? A database or ERP program, perhaps? If so, you are a prime candidate for RemoteApp, a remote access tool introduced by Microsoft for Server 2008 R2. However, many people who are using Terminal Server/RDS...
Show more articles
...