Tag: Access control
January 19, 2024 |
A Deep Dive into NetSuite Roles and Permissions
A clear and confident understanding of user roles is vital to successfully managing NetSuite. Whether you are implementing a new account, cleaning up an old one or setting up segregation of duties for SOX compliance, you need to have a firm grasp of a few fundamentals.
Understanding User...
March 3, 2023 |
Securing Your Amazon S3 Buckets
Amazon Web Services (AWS) is the world’s largest cloud provider, with well over a million active users. The popularity of AWS makes it one of the biggest targets for cybercriminals — and one of the leading contributors to breaches is incorrectly configured Amazon S3 buckets. For example, an...
October 13, 2022 |
Securing Your Group Managed Service Accounts
Group Managed Service Accounts Overview
The traditional practice of using regular user accounts as service accounts puts the burden of password management on users. As a result, the account passwords often stay the same for years — which leaves them highly susceptible to brute force attacks and...
October 8, 2021 |
User Entitlement Review Explained
What is an entitlement review?
The entitlement review definition is simple: a review of user access permissions and other rights. The goal of a user entitlement review is to ensure that each user in the IT environment has access to the data they need to do their job and nothing more — the...
January 13, 2021 |
Top 11 NTFS Permissions Tools for Smarter Administration
Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few paid and free tools that will help you save time on generating these reports.
Download Free Guide:
NTFS Permissions Management...
April 30, 2019 |
What is the Principle of Least Privilege?
One of the most basic things an organization can do to mitigate the risk of a security breach is implement the principle of least privilege (POLP). Read this blog to learn what POLP is and how you can use this principle to strengthen your security posture.
The Principle of Least Privilege...
March 26, 2019 |
The CIA Triangle and Its Real-World Application
What is the CIA triad?
Information security revolves around the three key principles: confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
January 30, 2019 |
How to Prevent Intellectual Property Theft by Insiders
Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
January 23, 2019 |
Top 5 Human Errors that Impact Data Security
Tighter data protection regulations have forced businesses to put data security at the top of their priority list. However most companies still lack a strong cybersecurity culture among their employees. In fact, a recent paper by Osterman Research reports that less than half (42%) of organizations...
December 26, 2018 |
Understanding SharePoint Permissions
The Purpose of SharePoint Permissions
SharePoint permissions control the access that employees, partners, third-party suppliers and others have to your SharePoint content. You can choose who can read specific information and who cannot. SharePoint permissions extend not only to display data in...