logo
August 13, 2020 | Ryan Brooks

How to Manage Redundant, Obsolete and Trivial Data

When a network contains an excess of redundant, obsolete and trivial (ROT) data, productivity and desired outcomes can take a hit. The good news is that organizations can significantly reduce the impact of ROT data when they plan properly and invest in the right tools. Handpicked related...
March 27, 2019 | Russell Smith

4 Steps to a Secure Active Directory Administration Model

Active Directory (AD) is a primary target for hackers as it provides a way to get access sensitive company data. Here are four considerations for establishing a secure administration model for Active Directory. 1. Remove excess domain administrator privileges Domain and enterprise administrator...
March 27, 2019 | Sarah Greesonbach

Plan Effective SIEM First, Compliance Second

Security information and event management (SIEM) is a major priority for large companies. It’s a reporting process that provides a holistic view of the health of an organization’s IT security as well as important details for various kinds of compliance regulations, including GLBA, PCI, FISMA,...
February 27, 2020 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
July 6, 2020 | Jeff Melnick

Top 7 IT Security Threats for 2016

While the number of announced data breaches in 2015 is lower compared to 2014, the number of compromised accounts increased dramatically, exposing more personal data than ever before. Among the top causes is an increase in hidden attacks that use more advanced technics to bypass security...
July 6, 2020 | Brian Svidergol

Avoid Data Breaches: Top Five Tips

It is hard to keep up with all of the various computer security incidents occurring daily. One can't help but wonder if more incidents are being reported and spreading through social media and internet news or if more incidents are taking place. It is likely both. The good news is, over the last...
...