logo
August 7, 2018 | Matt Middleton-Leal

How to Calculate Return on Security Investment

During my 20+ year career in IT, I have been involved in projects from many different angles. I have been an end user and a consultant; I have managed technology and I have sold it. But throughout it all, there has been one constant challenge:  How to assess the return on investment for a...
December 18, 2014 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in Windows Server 2012

Windows Server is one of the most commonly deployed critical systems in the organization. Most of the applications used in the organization are also Windows based, plus there are other legacy applications built on these Windows platforms. Since these servers are used the most, they need to be...
November 7, 2014 | Danny Murphy

How to Detect Changes to Organizational Units and Groups in Active Directory

Accidental or malicious changes to Organizational Units (OU) and groups in Active Directory almost inevitably lead to trouble for IT departments. Here are some of the most common examples: if an OU that contains “User Accounts” is deleted, users will not be able to log in or experience...
October 7, 2014 | Deb Shinder

5 Reasons to Reassess Your IT Security Strategy

If you’ve been in the IT field for a while, you know that one thing you can depend on is that you can’t depend on anything to stay the same. Technology is always advancing, trends are always changing, and you’re often left scrambling to keep up. Nowhere is this more true than in the security...
...