logo
August 20, 2024 | Martin Cannard

What is Zero Trust?

"Never trust; always verify." That's the philosophy that drives the Zero Trust model, and it represents a major shift from the previous motto: "Trust but verify." As threat actors have become more sophisticated, organizations have shifted their security frameworks away from a network-centric model...
July 26, 2024 | Jonathan Blackwell

Access Control Management Software: What to Know Before Choosing a Solution

Your organization deals with various forms of sensitive information. It could be company secrets, customer data, or proprietary research — whatever the case, security should be your top priority.  This is especially true given the heightened security concerns worldwide, with malicious...
July 18, 2024 | Jonathan Blackwell

A Practical Guide for Implementing and Managing Remote Access Solutions

Not long ago, remote access was reserved for a select few, such as traveling salespeople and senior executives. Today, it has become ubiquitous. Indeed, users across many roles and functions in the modern office now routinely connect to the corporate network from off-site locations and work with...
July 18, 2024 | Craig Riddell

10 Security Risks of Poor Access Management and How to Mitigate Them

Secure access management is more than just strong password policies and multi-factor authentication (MFA) – it includes a variety of processes and tools that create an integrated and comprehensive approach to safeguarding digital assets. To manage access effectively, organizations must implement...
July 4, 2024 | Martin Cannard

What is Access Control Management and Why Is It Important?

One of the most important aspects of modern cybersecurity is managing access to IT systems and data. Indeed, organizations that lack robust access management are putting a lot on the line, from customer trust to business revenue.  This article explains access control management, explores...
January 19, 2024 | Paul Staz

A Deep Dive into NetSuite Roles and Permissions

A clear and confident understanding of user roles is vital to successfully managing NetSuite. Whether you are implementing a new account, cleaning up an old one or setting up segregation of duties for SOX compliance, you need to have a firm grasp of a few fundamentals. Understanding User...
March 3, 2023 | Farrah Gamboa

Securing Your Amazon S3 Buckets

Amazon Web Services (AWS) is the world’s largest cloud provider, with well over a million active users. The popularity of AWS makes it one of the biggest targets for cybercriminals — and one of the leading contributors to breaches is incorrectly configured Amazon S3 buckets. For example, an...
October 13, 2022 | Kevin Joyce

Securing Your Group Managed Service Accounts

Group Managed Service Accounts Overview The traditional practice of using regular user accounts as service accounts puts the burden of password management on users. As a result, the account passwords often stay the same for years — which leaves them highly susceptible to brute force attacks and...
October 8, 2021 | Tiffany Sexton

User Entitlement Review Explained

What is an entitlement review? The entitlement review definition is simple: a review of user access permissions and other rights. The goal of a user entitlement review is to ensure that each user in the IT environment has access to the data they need to do their job and nothing more — the...
January 13, 2021 | Dirk Schrader

Top 11 NTFS Permissions Tools for Smarter Administration

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few paid and free tools that will help you save time on generating these reports. Download Free Guide: NTFS Permissions Management...
Show more articles
...