Netwrix recognized in Gartner’s 2020 Market Guide for File Analysis Software Learn More
30 January, 2019 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
30 September, 2016 | Ryan Brooks

3 Pokémon GO Security Risks

Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
30 August, 2016 | Ryan Brooks

11 Steps to Insider Threat Mitigation

Have you ever considered that your employees could be putting your organization’s most valuable information assets at risk? This article details key best practices for mitigating insider threats through extended visibility into data activity, systems and users — and offers a solution that can...
23 March, 2016 | Jeff Melnick

How to Detect Who Deleted a Group Policy Object

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to...
21 March, 2016 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
1 March, 2016 | Jeff Melnick

SysAdmin Magazine March 2016: Preparing for IT Auditors

Over the last few years, there has been a rise in the number of vulnerabilities that have been publicly announced.  Following compliance regulations is much more than a duty for stakeholders, it is inevitable component of the corporate security strategy. On the other hands passing compliance...
28 January, 2016 | Alex Vovk

5 Steps to Protect Your Network from Cybercriminals

Unfortunately, 70% of organizations which have established controls to manage changes in their IT infrastructures, bypass security policy requirements and unable to provide preventative actions in time. This increases the risk of data breaches and undermines the viability of companies’ own...
21 December, 2015 | Danny Murphy

3 Lessons to Learn from Data Breaches of 2015

The year of 2015 became notorious for data breaches compromising on average more data than ever before. Any security breach is a result of security gap, negligence, or underestimation of human factor. Some of them could have been prevented, if employees had better followed security policies or...
Show more articles