1 May, 2019 | Brian Johnson

What Are Mousejacking Attacks, and How to Defend Against Them

If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes using a $15 USB radio device that discovers vulnerable devices. In this podcast, Brian Johnson,...
23 August, 2018 | Jeff Melnick

Auditing Windows Systems

Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing...
15 March, 2016 | Alex Vovk

Infographics: Common Drawbacks of SIEM Solutions

SIEM is a complex solution that requires thorough maintenance and support, which often skyrockets SIEM expenses. The need to hire and train more SIEM analysts is named as the main factor that significantly influences the total cost of SIEM ownership. It earned the highest score (4.8) in the rating...
1 March, 2016 | Jeff Melnick

SysAdmin Magazine March 2016: Preparing for IT Auditors

Over the last few years, there has been a rise in the number of vulnerabilities that have been publicly announced.  Following compliance regulations is much more than a duty for stakeholders, it is inevitable component of the corporate security strategy. On the other hands passing compliance...
24 December, 2014 | John O'Neill Sr.

5 Steps for Protection against Wiper Malware

Significant security threats emerged in 2014. Closing out this epic year with a bang is Destover, aka Wiper. Wiper, as far as security threats go, is significant. Significant enough that the FBI quietly sent a memo to businesses and government agencies advising vigilance against Wiper based...
30 October, 2014 | Jeff Melnick

Can SIEM Solutions Be Effectively Used for Change Auditing?

This should be no revelation to IT professionals: you have to regularly monitor changes occurring in your network – and mainly for two reasons. The first one is this: continuous monitoring will take pain off meeting compliance requirements and surviving auditor’s visits. The second reason to...
23 September, 2014 | John O'Neill Sr.

Endpoint Protection vs Modern Threats

As IT professionals, it’s our responsibility to do everything within our power to protect our organizations from IT security threats. Unfortunately, all too often I hear fellow IT pros express an almost universal confidence in endpoint protection as the be-all, end-all to combating these threats....
17 September, 2014 | Nick Cavalancia

Exchange Server Down: You Only Have Minutes

You just got the call: your Exchange server is not sending or receiving email. Your one and only Exchange server. OK, this is bad. You drop everything and begin to check the Exchange server for problems. It is up? Yes. Are the needed services running? Yes. Does it have enough disk space?...
Show more articles
...