6 September, 2018 | Jeff Melnick

File Server Security with FSRM, EFS and BitLocker

Organizations today store data in many places, including both the corporate file servers and users’ personal devices. To ensure both security and regulatory compliance, IT administrators need to tightly control access to data stored on file servers, and also protect data on portable devices to...
30 August, 2018 | Jeff Melnick

Privileged Access Management in Windows Server

Many organizations struggle to secure their systems because their Active Directory is already compromised. AD is usually compromised by insiders or successful attacks on them. So how to keep environment protected even when a privileged your account got hacked? Microsoft Windows Server 2016 has...
7 December, 2017 | Pierre Dehombreux

7 Tips to Avoid Data Theft by Ex-Employees

By Pierre Dehombreux, Director of Information Technology, Whiteriver Unified School District Disabling the user accounts of fired employees right after their dismissal does not guarantee they won’t break through your defenses. For example, they can bribe friendly and perhaps sympathetic former...
26 October, 2017 | Michael Ustinov

How to Mitigate the Risk of Employee Data Theft

Picture your IT infrastructure as a castle where your highly critical data resides. Just a few years ago, to defend those “crown jewels,” you could simply build a moat around the perimeter of the castle. However, times have changed. Businesses still spend billions of dollars a year on firewalls...
17 October, 2017 | Jeff Melnick

Top 3 Ways Departing Employees Steal Your Data

Cybercrime keeps evolving, but one thing stays the same: The biggest security threats are often not outside your company, but inside. The problem isn’t limited to large organizations; in fact, small and mid-sized businesses fall victim to employee data theft even more often, though these breaches...
Show more articles