06.21.2017 , Security, by .

As IT environments become increasingly more complex and interconnected, and the number of reported cyber-attacks continue to rise, organisations must have some form of data breach prevention strategy in place. According to a recent report by the Ponemon Institute, the average cost of a data breach is estimated to be $4 million, with each compromised record costing around $158. How Does a Data Breach Happen? A recent report published by … Read more

06.19.2017 , Active Directory, Auditing, by .

People generally think that auditing and monitoring are the same thing and, in some ways, they are. The differences between them are subtle, but important none-the-less. In short, auditing is done by auditors, and it is the auditors responsibility to make use of the available technology to aggregate and present the log data in a way that that can be understood and “monitored” by administrators and managers. While most modern … Read more

06.16.2017 , Security, by .

SIEM stands for Security Information and Event Management, and plays an important role in data security. SIEM applications and services are typically capable of aggregating data from various sources, searching through logs, spotting anomalies and patterns, and providing long-term data retention, which can be used to assist with forensic investigations. Additionally, SIEM solutions provide automated alerts and reports, which are presented via an intuitive dashboard etc. As IT systems become … Read more

06.14.2017 , Security, by .

Issues relating to data privacy continue to hit the headlines on a regular basis. As such, the European Union have introduced the General Data Protection Regulation (GDPR), which is designed to replace the current Data Protection Directive (DPD). The new regulation will come into effect as of May 2018,. The pendulum is swinging, the alarm bell is ringing, yet many organisations continue to snooze. Of course, it may be the … Read more

06.12.2017 , Security, by .

Should organisations invest valuable resources hiring specialised security staff, or is there a more effective alternative? According to a recent report over 50% of UK companies have a severe shortage of IT security professionals, and it looks like this shortfall is set to continue. Cyber-attacks are constantly evolving and they often target individuals who are inexperienced and inattentive. And of course, it’s not only external threats that are a concern, … Read more

06.06.2017 , Security, by .

According to a survey conducted by Cisco, “In the past two years, more than 250 million confidential records were reported lost or stolen”, and many of these incidents were perpetrated by insiders. That’s not to imply that your staff members are crooks, they’re often just careless or ill-informed about the consequences of their actions. To make matters worse, broader data access methods and transportability of data are creating even more … Read more

05.31.2017 , Active Directory, by .

In every organization, Active Directory administrators need to be able to produce detailed reports on user access, object modification, privileged user activities and more. The reason for this may be down to external compliance requirements, IT security, litigation purposes or a combination of all three. Depending on the requirement, the urgency of such reports may vary. For example, if you are tracking Active Directory activities in order to maintain network … Read more

05.26.2017 , Security, by .

A common misconception is that the vast majority of cyber-attacks are instigated by malicious hackers who deliberately break in to your system to steal your data. While this does happen, the belief that all attacks happen this way undermines the very real threat posed by your very own staff. According to a report published by MacAfee, insiders were responsible for 43% of data loss. Should an organisation fail to acknowledge … Read more

05.12.2017 , Change Auditing, File Server Auditor, by .

Many IT Administrators find it difficult to implement an in-depth and pro-active File Server Audit strategy. If an important event happens and you want to investigate, you may have to wade through gigabytes of event logs on the Windows devices; which can often be like finding a needle in a haystack. Event logs stored on Windows File Systems are so verbose that deriving meaningful information from them can be very … Read more

05.09.2017 , Security, by .

According to a recent report by Bitglass, in 2016 there were 328 data healthcare data breaches reported in the US. That’s 60 more breaches than there were in 2015. An estimated 16.6 million US citizens were exposed as a result. The breaches were caused by various hacks, lost or stolen devices, and unauthorized disclosure of sensitive information. However, while the number of reported breaches are increasing, the overall number of … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.