In reviewing the DFS Cybersecurity regulation Section 500.02, I immediately began thinking of the NIST Framework. Section B has several subsections that map to NIST:
Identify Risks | Identify |
Defensive Infrastructure | Protect |
Detect Cybersecurity… |
Check out our recent webcast entitled, Preparing for the Disgruntled Privileged User — Three Ways They Can Hose Your Environment in Minutes with Brian Hymer, Strategic Systems Consultant and windows security expert, Randy Franklin Smith. Brian and…
Cyber security threats from external attackers are a constant worry for all organizations, as evidence by the many recent, headline-grabbing Ransomware data breaches such as WannaCry, Petya, Bad Rabbit.
However, today’s most damaging cyber security threats…
Market and regulatory changes such as the Affordable Care Act are fueling a historic period of consolidation in the healthcare market. Independent health systems are struggling to survive on their own due to reduced payouts, driving mergers, acquisitions…
Several forces are combining to create a historic period of consolidation in the healthcare industry.
Increased competition, a shift to outcomes-based reimbursement models, and an overall need to widen the scope of care while reducing costs are driving…
If you’ve connected to headline news in any way - watch, listen, or read - since last Friday then you must have heard about the massive cyber-attack - WannaCry – a ransomware attack on Microsoft Windows operating systems that have infected more…
The challenges associated with securing data in Office 365, whether completely cloud based or a hybrid AD iteration, are numerous, and addressing them requires a solid plan to ensure your risk of a data breach or accidental exposure is minimized.
That…
If your organization made the jump to Office 365 and are now completely cloud based or in a hybrid AD environment, you probably spent a lot of time getting your on-premises AD ready for the move. Now that your new cloud or hybrid environment is in place…
Office 365 has more than 60 million active monthly users, and adoption of the platform is increasing—for good reason. It allows organizations to reduce infrastructure and costs related to licensing and maintenance, while expanding storage efficiencies…
In my previous post, I touched on how you can identify users in AD with elevated rights. Now we need to determine if they're really necessary.
Step 2: Identifying what rights are needed for the job.
I can't begin to tell you how many companies that…
Our data and systems are frequently under attack these days. A more traditional attack is from external threats like viruses or hackers trying to gain access from outside of your environment. Threats from inside your environment are on the increase though…
A major release of Desktop Authority has been a long time coming. Here are just some of the exciting new features and enhancements included in the latest version:
Off-Network support for domain joined machines
Privilege Manager's application whitelisting abilities has finally met its match, and it's called Blacklisting...
What’s New in Privilege Manager for Windows 4.0?
Blacklist Feature
Co-Authored by Matt Nelson
Image Credit: Trev Grant | CC 2.0
YES! It’s October, and while most of you are using your in-laws’ wardrobe to decorate the front yard for Halloween and scare off (youth) intruders, we thought we’d let you know it is also National…
PSTs aren't pure evil. By making data personal, IT benefits with less data on the server so backups complete faster and require less storage.
However, without visibility to PSTs, security and compliance issues for your organization becomes a major concern…
GDPR establishes a number of key principles of data protection to be implemented for all EU residents. There is no escape from GDPR: organisations cannot outsource data processing to a non-EU country and thereby operate outside the auspices of GDPR. If…
This second blog in a series on the impact of GDPR on IT operations examines the IT requirements specified in or implied by the new regulation.
There are three main areas that IT operations must focus on in order to facilitate an organisation's compliance…
GDPR is a game-changer for the processing of personal data, but it also has substantial impact on IT operations more generally. This blog is the first in a short series that will explore some of the key areas where GDPR will have an impact on IT operations…
As the 50th anniversary of the Star Trek TV series looms, it’s interesting to think of the wisdom that can be shared from the many voyages of starship Enterprise as it went “where no man has gone before.” Remember “The Trouble with Tribbles” episode…
Enterprise Reporter provides a unified solution for data discovery and report generation. Using the Enterprise Reporter Configuration Manager, administrators can easily configure and deploy discoveries to collect and store data. Once the data has been…
Co-written with Priscilla Tenggara.
When it comes to Pokémon Go horror stories, we’ve heard it all - from trespassing, to injuries, to even robberies. It seems like the risk to users has no limit. Whether or not it’s intentional, users gaining access…
The cloud: the final frontier. These are the voyages of your enterprise. Its mission: to explore strange new technologies, to seek out innovation, to boldly go where your organization has never gone before.
I hope you’re as excited about the new Star…
It’s crazy - technology and business are moving faster than ever and you’re sprinting just to keep up. Meanwhile, your workday is wasted on tons of repetitive, day-to-day tasks. That’s why we hosted a Virtual Tradeshow.
The bad news…