logo
September 17, 2020 | Jeff Melnick

Hybrid Cloud Security

Hybrid cloud is an increasingly popular infrastructure option for companies in industries from game development to finance. But what is it, and what are the most effective hybrid cloud security practices for protecting your sensitive and regulated data? What is hybrid cloud? A hybrid cloud is a...
September 20, 2018 | Ryan Brooks

Securing Your Servers with Windows Defender, AppLocker, SCT and More

Malware — computer viruses, worms, Trojan horses, ransomware, spyware and so one — is a continuous threat to organizations because it can damage devices and enable unauthorized parties to access the network remotely to collect and transmit sensitive information. Windows Server 2016 includes...
September 5, 2018 | Dirk Schrader

What Is Elevation of Privilege and Why is it Significant?

Privilege escalation is a common tactic present in almost every cyberattack today. Malicious insiders, ransomware gangs and other threat actors often use it in combination with to lateral movement to traverse a victim's network to gain unauthorized access to sensitive IT resources. Elevated access...
June 28, 2018 | Matt Middleton-Leal

Four Tips for Building a Strong Security Culture in Your Organization

Today, nearly every organization relies on stable and secure IT operations, so cyber risks merit the same careful attention as other types of risks. Top leaders understand this: The World Economic Forum’s 2018 Global Risk Report claims that most influential movers and shakers view cyber attacks...
October 20, 2016 | Ilia Sotnikov

Stay Cyber Aware: 5 Ultimate Cyber Security Strategies

October is National Cyber Security Awareness Month. Netwrix supports the collaboration initiative of the US government and the IT industry and publishes 5 ultimate cyber security strategies that IT managers should keep in consideration to ensure their companies’ safety.  Implementation of these...
June 29, 2016 | Alex Vovk

State of Visibility into IT Environment

Failure to quickly spot malicious activity and investigate the issue often impacts business processes. Damage may occur in various forms: data breaches, operational downtime, noncompliance etc. All of them eventually lead to financial losses and affect customer loyalty. Thus, visibility is vital...
December 16, 2015 | Jeff Melnick

5 Jedi IT Security Tenets To Defend Against Data Breaches

Star Wars is not just a cultural phenomenon, it is a story that can be interpreted in many ways, even as a data breach case.  The everlasting battle between hackers and IT pros very much resembles the war between the light and the dark sides from the Star Wars movies. By learning from failure and...
October 21, 2015 | Jeff Melnick

How Should IT Handle User Termination

Employment termination, as well as taking aboard the new hires, is an ongoing process for every organization. People get fired, quit/resign, replacements are found – it’s a never-ending story. IT departments, among others, have to handle account deletions and other actions related to employee...
October 19, 2015 | Sarah Greesonbach

4 Tips for Maintaining SOX Compliance in 2015

If you run a public business in the United States, you are required to comply with the Sarbanes-Oxley Act (SOX). This piece of legislation was implemented to improve the accuracy of corporate disclosures and protect shareholders and the general public from the security threats of accounting errors...
October 12, 2015 | Danny Murphy

Keeping Track of Compliance Regulations to Avoid Disasters

Imagine a world where all IT systems run just as they were once configured, and nothing bad happens to them – or nothing at all, for that matter. There is nobody who comes into your office demanding all kinds of reports to be pulled out immediately with all the changes in all the systems ready...
Show more articles
...