logo
January 30, 2019 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
June 28, 2018 | Matt Middleton-Leal

Four Tips for Building a Strong Security Culture in Your Organization

Today, nearly every organization relies on stable and secure IT operations, so cyber risks merit the same careful attention as other types of risks. Top leaders understand this: The World Economic Forum’s 2018 Global Risk Report claims that most influential movers and shakers view cyber attacks...
September 30, 2016 | Ryan Brooks

3 Pokémon GO Security Risks

Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
August 30, 2016 | Ryan Brooks

11 Steps to Insider Threat Mitigation

Have you ever considered that your employees could be putting your organization’s most valuable information assets at risk? This article details key best practices for mitigating insider threats through extended visibility into data activity, systems and users — and offers a solution that can...
March 23, 2016 | Jeff Melnick

How to Detect Who Deleted a Group Policy Object

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to...
March 21, 2016 | Alex Vovk

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation...
December 21, 2015 | Danny Murphy

3 Lessons to Learn from Data Breaches of 2015

The year of 2015 became notorious for data breaches compromising on average more data than ever before. Any security breach is a result of security gap, negligence, or underestimation of human factor. Some of them could have been prevented, if employees had better followed security policies or...
June 19, 2015 | Russell Smith

Configure Audit Policy and Security Using the Security Configuration Wizard

Windows Server security has improved markedly over the last decade, putting it up there with Unix-based operating systems, which traditionally are considered more secure than Windows. Much of this work is due to the infamous Vista reset, which saw Microsoft plough resources into Windows XP Service...
...