Tag: Malicious activity
July 23, 2020 |
User Behavior Analytics: Best Practices You Should Start Now
How much do you know about User Behavior Analytics (UBA), emerging solution that helps detect growing malicious and abusive insider activity across IT environment that otherwise can go unnoticed?
This article details the key challenges for protecting the most critical assets within your IT...
March 27, 2019 |
Defending Against Crypto-Ransomware Guide
Ransomware is one of the fastest growing classes of malicious software. In recent years, ransomware has evolved from a simple lock screen with the ransom damage into far more dangerous variants, such as crypto-ransomware.
1. What is Crypto-Ransomware
Unlike traditional malware,...
February 27, 2019 |
6 Tools to Protect Your Domain Controllers
There are many things that you can do as an administrator to reduce or eliminate risks associated with your Domain Controllers. In this article, we’ll take a look at some tools you can employ to help with this.
Attack Surface – This concept refers to software, protocols and ports are used...
July 6, 2020 |
4 Rules to Enhance Email Security in the Cloud
The long-existing problem of email hacking appears to be unsolved by 2016. According to the recent warning released by FBI, companies have lost above $2.3 billion over the past three years due to email frauds, in which the employees are tricked into wiring funds to adversaries by fake messages sent...
March 27, 2019 |
Tracking Malicious Windows Server Events with PowerShell
Windows servers can potentially generate thousands—or even hundreds of thousands—of events daily. Most are created from perfectly safe events that system administrators use to get a glimpse of what’s going on. An event might be generated to indicate a disk is running out of free space, an...