New Game: Play the sysadmin Ninja Turtle game and win prizes Play Now
15 February, 2017 | Russell Smith

3 Ways to Secure Service Accounts in Active Directory

If you’re looking for security weak spots in your organization, auditing service accounts isn’t a bad place to start. Active Directory audit should include establishing the rights assigned to each account, the password strength, the last time it was reset, and whether it is a domain account,...
21 September, 2015 | Richard Muniz

Finding Inactive Users for SOX Audit

Don’t we tend to inflict nightmares on ourselves? When the small company I was with decided to go public, SOX audit reared its ugly head. And the internal SOX auditors were very quick to jump on those self-inflicted wounds. Allow me to explain. Someone left, and the most that was done to their...
17 August, 2015 | Krishna Kumar

Securing SharePoint: How and Why

SharePoint is one of the easiest applications to deploy and install, but it is not easy to configure with full proof security. Many administrators just perform the basic deployment without much security configuration. There is no set configuration to make it fully secure, since every environment is...
14 August, 2012 | Robert Bobel

Reducing the cost of employee owned mobile devices

The broad appeal of using personal mobile devices at work has driven IT to develop effective employee device policies. While allowing employees to “Bring Your Own Device” (BYOD) does have its advantages, traditional costs associated with users connecting to the network actually increase because...