logo
March 26, 2020 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
January 30, 2019 | Matt Middleton-Leal

Four Tips for Building a Strong Security Culture in Your Organization

Today, nearly every organization relies on stable and secure IT operations, so cyber risks merit the same careful attention as other types of risks. Top leaders understand this: The World Economic Forum’s 2018 Global Risk Report claims that most influential movers and shakers view cyber attacks...
May 22, 2019 | Ryan Brooks

3 Pokémon GO Security Risks

Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
June 11, 2019 | Ryan Brooks

11 Steps to Insider Threat Mitigation

Have you ever considered that your employees could be putting your organization’s most valuable information assets at risk? This article details key best practices for mitigating insider threats through extended visibility into data activity, systems and users — and offers a solution that can...
February 25, 2019 | Jeff Melnick

How to Detect Who Deleted a Group Policy Object

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to...
February 27, 2020 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
September 2, 2020 | Alex Vovk

5 Steps to Protect Your Network from Cybercriminals

Unfortunately, 70% of organizations which have established controls to manage changes in their IT infrastructures, bypass security policy requirements and unable to provide preventative actions in time. This increases the risk of data breaches and undermines the viability of companies’ own...
July 6, 2020 | Danny Murphy

3 Lessons to Learn from Data Breaches of 2015

The year of 2015 became notorious for data breaches compromising on average more data than ever before. Any security breach is a result of security gap, negligence, or underestimation of human factor. Some of them could have been prevented, if employees had better followed security policies or...
September 2, 2020 | Russell Smith

Configure Audit Policy and Security Using the Security Configuration Wizard

Windows Server security has improved markedly over the last decade, putting it up there with Unix-based operating systems, which traditionally are considered more secure than Windows. Much of this work is due to the infamous Vista reset, which saw Microsoft plough resources into Windows XP Service...
September 2, 2020 | Brian Keith Winstead

HIPAA Settlements: The Largest One Could Have Been Prevented

The Health Insurance Portability and Accountability Act (HIPAA) has been around since 1996; that’s 18 years. Cyber criminals and data breaches continue to flourish, with headline cases breaking every couple of months. Yet too many organizations still fail at implementing the necessary level of...
...