May 22, 2020 | Jeff Melnick

Top 10 Best Windows Server Monitoring Software Tools

If you don’t know the state of your network and server health every second of the day, you're like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good tools, both commercial and open source, for network and Windows Server monitoring. Since good and free...
May 20, 2020 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
March 27, 2020 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
October 29, 2019 | Jeff Melnick

How to Detect User Account Changes in Active Directory

Tracking user account changes in Active Directory is primarily important from compliance and security-related considerations and also for operational efficiency purposes. Inactive user accounts or a large number of new accounts with extended permissions, disabled or suspiciously modified user...
October 29, 2019 | Jeff Melnick

Top 10 Best Network Monitoring Tools

If you don’t know the state of your network every second of the day, you're like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good software solutions, both commercial and open source, for network monitoring. Handpicked related content: [Free...
October 28, 2019 | Brian Keith Winstead

Network Auditing vs NSA Surveillance

Last December, Microsoft published an article on its official blog detailing steps the company planned to take to protect its customers’ data from government snooping. Written by Brad Smith, general counsel and executive vice president for Microsoft Legal & Corporate Affairs, the article...
October 17, 2019 | Brian Keith Winstead

Preparing for the Outside Auditor with Regular Monitoring

Does your business get audited by outside agencies? If you handle sensitive data, such as customer credit card numbers or patient health information, there’s a good chance you do. And the approach of auditors probably fills most IT professionals with a certain amount of dread. Queue Blue Öyster...
October 17, 2019 | Chris Rich

What IT professionals think about HIPAA

A recent Spiceworks discussion on HIPAA compliance revealed many interesting thoughts from IT pros who have wrestled with HIPAA compliance directly. In this post I will attempt to summarize their perspectives on HIPAA and what you need to know. While it may sound scary, HIPAA was enacted to among...
October 4, 2019 | Jeff Melnick

Network Devices Explained

To build a strong network and defend it, you need to understand the devices that comprise it. What are network devices? Network devices, or networking hardware, are physical devices that are required for communication and interaction between hardware on a computer network. Types of network...
Show more articles
...