logo
January 19, 2024 | Paul Staz

A Deep Dive into NetSuite Roles and Permissions

A clear and confident understanding of user roles is vital to successfully managing NetSuite. Whether you are implementing a new account, cleaning up an old one or setting up segregation of duties for SOX compliance, you need to have a firm grasp of a few fundamentals. Understanding User...
March 3, 2023 | Farrah Gamboa

Securing Your Amazon S3 Buckets

Amazon Web Services (AWS) is the world’s largest cloud provider, with well over a million active users. The popularity of AWS makes it one of the biggest targets for cybercriminals — and one of the leading contributors to breaches is incorrectly configured Amazon S3 buckets. For example, an...
October 13, 2022 | Kevin Joyce

Securing Your Group Managed Service Accounts

Group Managed Service Accounts Overview The traditional practice of using regular user accounts as service accounts puts the burden of password management on users. As a result, the account passwords often stay the same for years — which leaves them highly susceptible to brute force attacks and...
October 8, 2021 | Tiffany Sexton

User Entitlement Review Explained

What is an entitlement review? The entitlement review definition is simple: a review of user access permissions and other rights. The goal of a user entitlement review is to ensure that each user in the IT environment has access to the data they need to do their job and nothing more — the...
January 13, 2021 | Dirk Schrader

Top 11 NTFS Permissions Tools for Smarter Administration

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few paid and free tools that will help you save time on generating these reports. Download Free Guide: NTFS Permissions Management...
April 30, 2019 | Farrah Gamboa

What is the Principle of Least Privilege?

One of the most basic things an organization can do to mitigate the risk of a security breach is implement the principle of least privilege (POLP). Read this blog to learn what POLP is and how you can use this principle to strengthen your security posture. The Principle of Least Privilege...
March 26, 2019 | Ryan Brooks

The CIA Triangle and Its Real-World Application

What is the CIA triad? Information security revolves around the three key principles:  confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
January 30, 2019 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
January 23, 2019 | Matt Middleton-Leal

Top 5 Human Errors that Impact Data Security

Tighter data protection regulations have forced businesses to put data security at the top of their priority list. However most companies still lack a strong cybersecurity culture among their employees. In fact, a recent paper by Osterman Research reports that less than half (42%) of organizations...
December 26, 2018 | Jeff Melnick

Understanding SharePoint Permissions

The Purpose of SharePoint Permissions SharePoint permissions control the access that employees, partners, third-party suppliers and others have to your SharePoint content. You can choose who can read specific information and who cannot. SharePoint permissions extend not only to display data in...
Show more articles
...