10.18.2017, Security, by .

The healthcare sector was a lucrative target for hackers in 2016, and unfortunately 2017 doesn’t appear to be any different. According to “The Identity Theft Resource Center,” 238 healthcare breaches have been reported so far this year. The most noticeable breach regarding the numbers of patient records impacted was a ransomware attack in Women’s Healthcare Group of Pennsylvania, cited by the HIPAA Breach Reporting Tool website. In this one incident, … Read more

10.16.2017, Security, by .

After reading this article, I have no doubt that you will be convinced you need a data loss prevention program. We all know that data leakage can be damaging for both the reputational and bottom line of any organization. We also know that if we do not have sufficient security measures in place, then a data loss incident is likely. Even though we are well-aware of these dangers and data … Read more

10.13.2017, Active Directory, Security, by .

Owing to its sheer size and complexity involved in its management or administration (especially by multiple persons), Active Directory is often plagued with security issues. With digitalization making headlines, the rapid pace at which most enterprises are embracing the latest technologies has necessitated the expansion of security and networking services. Implementing a proactive auditing solution, like LepideAuditor, which gives you granular visibility over all events, can help you spot any … Read more

10.11.2017, Security, by .

According to a recent Cyber Security Breaches Survey, carried by out Ipsos MORI, only 43% of businesses reported their most disruptive breach outside their organisation. Even then, they would commonly report the breach to an outsourced cyber security provider, in the hope that they can offer a resolution. Of the 26% of breaches that were reported eternally, the majority of those breaches (28%) were reported to banks, building societies, and … Read more

10.09.2017, Auditing, File Server, by .

I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands. As an IT manager; you need to be doing everything you can to ensure the integrity of your data. If you’re wondering how best to do this, I’d suggest you start right here. Listed below are some of our … Read more

10.05.2017, Security, by .

In 2017 alone, hundreds of thousands of computers across the globe have been affected by ransomware attacks; draining enterprises of millions of dollars. Those who have been affected all offer the same advice; protect yourself before it happens to you! While you may already be using anti-ransomware software, researchers have identified several new ransomware threats that your security software may not be equipped to fight with (Ovidly Stealer, Hackshit, Satan … Read more

10.03.2017, Security, by .

Does the thought of keeping your Active Directory secure keep you up at night? If you’re an IT administrator, I can understand your pain. Active Directory controls access to critical systems and data; so it’s the ultimate prize for attackers. Ensuring that your Active Directory is secure should be your number one priority. Below, I have listed some of the most common Active Directory security faux pas. Hopefully none of … Read more

09.29.2017, Auditing, by .

Ninety-five percent of the Fortune 1000 companies, and millions of businesses in the SME segment, use Active Directory as the base of their network infrastructure. Ensuring Active Directory security whilst staying compliant to ever evolving regulatory guidelines is starting to become a challenge for many organizations. Thankfully, it doesn’t have to be. In this article, I hope to show you why you need LepideAuditor – a scalable and affordable IT … Read more

09.28.2017, Security, by .

With security and compliance demands increasing daily, the need for organisations to increase their auditing, monitoring and alerting capabilities across there IT environments has followed suit. In a study we recently conducted, we found that 6 in 10 mid to large sized organisations are still using Native Auditing as their primary auditing method. Although we’ve definitely been seeing a change in this mind-set. Out of these 6, at least half … Read more

09.26.2017, Security, by .

Introduction 2017 has been a year full of high profile data breaches and this week, global accounting firm Deloitte has joined the list of those affected (reports the Guardian). If you don’t know who Deloitte are, all you need to really know is that they reportedly turned over a record $37bn in revenue last year. They also provide auditing, tax consulting and high-end cybersecurity advice to some of the world’s … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.