Extra... extra… read all about it!
Data Breaches are the New Reality! Are you Prepared?
It's no surprise (yet frightening) that there is a drastic increase in news headlines that emphasize the security risks and challenges IT professionals face…
Extra... extra… read all about it!
Data Breaches are the New Reality! Are you Prepared?
It's no surprise (yet frightening) that there is a drastic increase in news headlines that emphasize the security risks and challenges IT professionals face…
Welcome back to my series of blog posts on the key cybersecurity lessons we need to take to heart from 2018. The posts draw from a webcast I hosted with Microsoft MVP and Windows security expert Randy Franklin Smith. So far, we’ve dived into several…
In this series of posts, I’m reviewing some of the key cybersecurity lessons we should take away from 2018. I covered them in a webcast that I did with Microsoft MVP and Windows security expert Randy Franklin Smith. In the previous two posts, I…
Welcome to the first in a series of blog posts in which we’ll review some of the big threat headlines from 2018 and see what we can learn to prepare for 2019. It’s all based on a webcast that I did with Microsoft MVP and Windows security expert…
In my previous blog post, I explored the first step in mitigating the insider threat — understanding and controlling privilege across the environment — and reviewed how Quest Enterprise Reporter Suite, Security Explorer and Change Auditor
…What images does the phrase “insider threat” conjure up in your mind? A disgruntled admin actively sabotaging your systems just before penning a resignation letter? A highly privileged contractor installing spyware that will keep exporting sensitive data…
In my previous blog post, I talked about different approaches you can take to identify insider threats in your Windows environment with user behavior analytics — a rule-based vs. pattern-based approach. Specifically, why pattern-based detection has advantages…
Every Wednesday in May, we’re hosting a live four-part webcast series, How to Overcome Common Hybrid AD and Cloud Security Challenges. The webcast series features a fictional character, Hank the Hacker, who represents hackers that appear in many…
Check out our recent webcast entitled, Preparing for the Disgruntled Privileged User — Three Ways They Can Hose Your Environment in Minutes with Brian Hymer, Strategic Systems Consultant and windows security expert, Randy Franklin Smith. Brian and…
Cyber security threats from external attackers are a constant worry for all organizations, as evidence by the many recent, headline-grabbing Ransomware data breaches such as WannaCry, Petya, Bad Rabbit.
However, today’s most damaging cyber security threats…
Remember Hank the Hacker? Hank is a fictional character we created for a recent webcast series around Active Directory security best practices. Hank represents hackers that appear in many shapes and sizes and who love to exploit the security limitations…
Our data and systems are frequently under attack these days. A more traditional attack is from external threats like viruses or hackers trying to gain access from outside of your environment. Threats from inside your environment are on the increase though…