logo
August 13, 2019 | Brian Johnson

What Are Mousejacking Attacks, and How to Defend Against Them

If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes using a $15 USB radio device that discovers vulnerable devices. In this podcast, Brian Johnson,...
February 21, 2019 | Jeff Melnick

Auditing Windows Systems

Continuously auditing the activity in your network is one of the most critical security best practices, since it helps you notice potentially malicious activity early enough to take action and prevent data breaches, system downtime and compliance failures. Top methods of Windows auditing...
March 27, 2019 | Alex Vovk

Infographics: Common Drawbacks of SIEM Solutions

SIEM is a complex solution that requires thorough maintenance and support, which often skyrockets SIEM expenses. The need to hire and train more SIEM analysts is named as the main factor that significantly influences the total cost of SIEM ownership. It earned the highest score (4.8) in the rating...
May 22, 2019 | Richard Muniz

Netwrix Auditor VEGA – New Capabilities, Better Look, And Still Easy to Use

I just recently wrote a blog that started with something my Grandpa used to say. “Never try anything new. Wait and see if some kill someone first”. I don’t think I’ve much to worry about with Netwrix Auditor VEGA. One of the first things I’ve got to say concerns the documentation. I...
May 29, 2019 | John O'Neill Sr.

5 Steps for Protection against Wiper Malware

Significant security threats emerged in 2014. Closing out this epic year with a bang is Destover, aka Wiper. Wiper, as far as security threats go, is significant. Significant enough that the FBI quietly sent a memo to businesses and government agencies advising vigilance against Wiper based...
February 25, 2019 | Danny Murphy

How to Detect Changes to Organizational Units and Groups in Active Directory

Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory almost inevitably lead to trouble for IT departments. Here are some of the most common examples: if an OU that contains “User Accounts” is deleted, users will not be able to log in or experience...
February 25, 2019 | Jeff Melnick

Can SIEM Solutions Be Effectively Used for Change Auditing?

This should be no revelation to IT professionals: you have to regularly monitor changes occurring in your network – and mainly for two reasons. The first one is this: continuous monitoring will take pain off meeting compliance requirements and surviving auditor’s visits. The second reason to...
April 5, 2019 | John O'Neill Sr.

Endpoint Protection vs Modern Threats

As IT professionals, it’s our responsibility to do everything within our power to protect our organizations from IT security threats. Unfortunately, all too often I hear fellow IT pros express an almost universal confidence in endpoint protection as the be-all, end-all to combating these threats....
October 29, 2019 | Nick Cavalancia

Exchange Server Down: You Only Have Minutes

You just got the call: your Exchange server is not sending or receiving email. Your one and only Exchange server. OK, this is bad. You drop everything and begin to check the Exchange server for problems. It is up? Yes. Are the needed services running? Yes. Does it have enough disk space?...
October 28, 2019 | Jeff Melnick

Netwrix Survey: Do You Actually Audit Changes?

There is no doubt, that organizations of all kinds and sizes face everyday changes to their critical IT systems. As the topic of administrative security becomes more and more important, the hazards of data breaches, information leakage and downtime must be avoided and any changes must be tracked...
Show more articles
...