logo
April 20, 2016 | Alex Vovk

4 Rules to Enhance Email Security in the Cloud

The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
November 11, 2013 | Nick Cavalancia

Best Practices for Change Management in the Data Center

When it comes to change management, Scott Matteson gets it.  Too many companies today make changes without any kind of change management in place. Scott's approach even includes the mandated use of individual accounts to perform changes so that Auditing of system changes can easily be tied back to...
November 7, 2013 | Nick Cavalancia

Death by Event Log Overload

When it comes to security, event logs are supposed to be the best friends of an IT guy managing the environment, right? Roger Grimes from InfoWorld claims that the evidence of malicious activity can be found in Event Logs. So, if companies today already have all necessary data that points...
July 25, 2013 | Jeff Melnick

Top 10 Systems that All Organizations Need to Audit but Often Don’t (part #1)

Ask an IT manager to tell you who made what changes to system configurations in their IT infrastructure and it will often involve a time-consuming manual process of trawling through a disparate array of native audit logs from servers and network equipment. Despite being slow and insecure this...
June 6, 2011 | Stephen Schimmel

Case Study: Eclipse Group Automates Infrastructure Change Auditing for Increased Security

With over 200 IT pros serving a wide variety of business needs, Eclipse Group offers a broad range of IT services and systems geared toward providing top-quality application development, infrastructure management, disaster recovery, risk management, modernization and more for IT departments across...
September 12, 2010 | Stephen Schimmel

Key Strategies for Simplified Exchange 2010 Auditing

For a moment, think of how you would feel about a stranger rifling through your house, opening up bills and examining your personal life? If not for obvious footprints left behind within the confined area, would you even know that a break-in occurred? Now consider the value of your exchange...
...