logo
August 7, 2018 | Matt Middleton-Leal

How to Calculate Return on Security Investment

During my 20+ year career in IT, I have been involved in projects from many different angles. I have been an end user and a consultant; I have managed technology and I have sold it. But throughout it all, there has been one constant challenge:  How to assess the return on investment for a...
December 18, 2014 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in Windows Server 2012

Windows Server is one of the most commonly deployed critical systems in the organization. Most of the applications used in the organization are also Windows based, plus there are other legacy applications built on these Windows platforms. Since these servers are used the most, they need to be...
November 7, 2014 | Danny Murphy

How to Detect Changes to Organizational Units and Groups in Active Directory

Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory almost inevitably lead to trouble for IT departments. Here are some of the most common examples: if an OU that contains “User Accounts” is deleted, users will not be able to log in or experience...
...