March 27, 2020 | Jeff Melnick

3 Strategies to Avoid Massive Data Breaches

No matter how strong your IT infrastructure security measures are, data breaches do happen. One of the most striking examples of a data breach is the US Air Force breach, which resulted in 100,000  lost investigation records due to file corruption. Unfortunately, neither investigation...
March 26, 2020 | Matt Middleton-Leal

Top 5 Human Errors that Impact Data Security

Tighter data protection regulations have forced businesses to put data security at the top of their priority list. However most companies still lack a strong cybersecurity culture among their employees. In fact, a recent paper by Osterman Research reports that less than half (42%) of organizations...
March 25, 2020 | Jeff Melnick

Privileged Access Management in Windows Server

Many organizations struggle to secure their systems because their Active Directory is already compromised. AD is usually compromised by insiders or successful attacks on them. So how to keep environment protected even when a privileged your account got hacked? Microsoft Windows Server 2016 has...
March 25, 2020 | Ryan Brooks

How to Detect Privileged Account Abuse

This post continues the series in which we discuss the threat of privilege abuse. Previously, we talked about what you should know about the threat of privileged users and three key things you can do now to start to gain the control you need over privileged users. In this post, we are going to talk...
January 15, 2020 | Jeff Melnick

How Can You Hold Privileged Users Accountable for Their Actions?

Why is it difficult to control the activity of privileged users? In a recent survey, 34% of respondents admitted to sharing passwords or accounts with their coworkers. Sharing credentials is a potentially risky activity, which may result in data breaches and system downtime. These risks are...
October 29, 2019 | Russell Smith

Basic Rules of Windows Server Security

While Windows Server is considered to be secure out-of-the-box, like any part of your IT infrastructure, it needs to be patched, monitored and configured to ensure that it is not exposed for a targeted attack. Let's go through some of the tools and best practices that can help you keep Windows...
October 29, 2019 | Jeff Melnick

Hot Tips: How to Harden Privileged Account Security

Privileged accounts are user accounts with extended permissions to access systems and data, such as the root account in Unix and Administrator accounts in Windows. Sometimes they are called “the keys to the kingdom” because a privileged account enables you do things ordinary users can’t, such...
October 29, 2019 | Russell Smith

Privileged Access Management to Secure a Compromised AD Forest

Privileged Access Management (PAM) is a new feature in Windows Server 2016 that can secure environments even in cases where AD is already compromised. In this blog, I’ll describe the architecture requirements for setting up PAM solutions. Many organizations struggle to secure their systems...
Show more articles
...