20 September, 2018 | Ryan Brooks

Securing Your Servers with Windows Defender, AppLocker, SCT and More

Malware — computer viruses, worms, Trojan horses, ransomware, spyware and so one — is a continuous threat to organizations because it can damage devices and enable unauthorized parties to access the network remotely to collect and transmit sensitive information. Windows Server 2016 includes the...
5 September, 2018 | Jeff Melnick

What Is Privilege Escalation?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
12 December, 2017 | Ryan Brooks

Insider Threat Detection: 10 Techniques for Top-to-Bottom Defense

In a recent post, How to Mitigate the Risk of Employee Data Theft, we looked at employee data theft as one of the top insider threats that can jeopardize your organization’s cyber and information security. We talked about how you can minimize this risk by implementing best practices, such as...
20 October, 2016 | Ilia Sotnikov

Stay Cyber Aware: 5 Ultimate Cyber Security Strategies

October is National Cyber Security Awareness Month. Netwrix supports the collaboration initiative of the US government and the IT industry and publishes 5 ultimate cyber security strategies that IT managers should keep in consideration to ensure their companies’ safety.  Implementation of these...
29 June, 2016 | Alex Vovk

State of Visibility into IT Environment

Failure to quickly spot malicious activity and investigate the issue often impacts business processes. Damage may occur in various forms: data breaches, operational downtime, noncompliance etc. All of them eventually lead to financial losses and affect customer loyalty. Thus, visibility is vital...
25 February, 2016 | Jeff Melnick

The 2016 Netwrix Customer Survey

The 2016 Netwrix Customer Survey was carried out from December 2015 to January 2016. It involved feedback of 376 paying customers who represent companies of various industries and sizes located worldwide. The survey found that Netwrix customers managed to achieve the following results: IT...
5 January, 2016 | Michael Fimin

Top 5 cybercrime patterns to watch out for in 2016

Netwrix predictions: What types of cybercrime will potentially affect U.S. companies in the coming year. According to the Chronology of Data Breaches by Privacy Rights Clearinghouse, a nonprofit organization that aims to raise awareness about how technology affects personal privacy, the number of...
30 December, 2015 | Danny Murphy

SysAdmin Magazine January: Threat Predictions and IT Tips

Dramatically increasing number of data breaches was one of the highest priorities facing IT managers, business owners and regulators in 2015. Among the top causes of sensitive data leaks is an increase in targeted attacks that use more advanced techniques to bypass security mechanisms. For the...
16 December, 2015 | Jeff Melnick

5 Jedi IT Security Tenets To Defend Against Data Breaches

Star Wars is not just a cultural phenomenon, it is a story that can be interpreted in many ways, even as a data breach case.  The everlasting battle between hackers and IT pros very much resembles the war between the light and the dark sides from the Star Wars movies. By learning from failure...
Show more articles
...