Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
20 September, 2018 | Ryan Brooks

Securing Your Servers with Windows Defender, AppLocker, SCT and More

Malware — computer viruses, worms, Trojan horses, ransomware, spyware and so one — is a continuous threat to organizations because it can damage devices and enable unauthorized parties to access the network remotely to collect and transmit sensitive information. Windows Server 2016 includes the...
5 September, 2018 | Jeff Melnick

What Is Privilege Escalation?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
12 December, 2017 | Ryan Brooks

Insider Threat Detection: 10 Techniques for Top-to-Bottom Defense

In a recent post, How to Mitigate the Risk of Employee Data Theft, we looked at employee data theft as one of the top insider threats that can jeopardize your organization’s cyber and information security. We talked about how you can minimize this risk by implementing best practices, such as...
20 October, 2016 | Ilia Sotnikov

Stay Cyber Aware: 5 Ultimate Cyber Security Strategies

October is National Cyber Security Awareness Month. Netwrix supports the collaboration initiative of the US government and the IT industry and publishes 5 ultimate cyber security strategies that IT managers should keep in consideration to ensure their companies’ safety.  Implementation of these...
Show more articles