Archive for 2017

In recent years organizations have been investing a fortune in cybersecurity, but ransomware still remains as prevalent today (and maybe even more dangerous) as it has ever been. Ransomware attacks are, in essence, simple to prevent if the right security culture is in place. But, whilst organizations have implemented sophisticated security firewalls, the attitudes towards ransomware have not changed fast enough. Recent ransomware attacks Looking back at recent security breaches, … Read more

Through Active Directory, administrators can assign and enforce the security policies of the entire domain and manage them from a central location. A big part of dealing with both external and internal attacks is tracking logon activity. Most organizations need to work on increasing log on control measures and proactively tracking the logon activities of all users. However, Active Directory logon and logoff controls have some major limitations which make … Read more

Despite the presence of sophisticated IT solutions, organizations often struggle to lay the foundation for a secure IT environment. Critical Servers, including File Server, Active Directory and Office 365, are a major target for attacks and data breaches in general. Regular auditing is therefore necessary to ensure the protection of critical business data, increase security and improve service availability with minimum downtime. To the relief of many IT administrators, Microsoft … Read more

A recent study found that Office 365 is present in about 91.4% of enterprises. Despite this, getting visibility on changes made to Office 365 can be a time-consuming and frustrating task for IT admins, especially if you’re having to do it manually. This cloud-based server often stores sensitive information such as financial records, business plans, payment card numbers, Social security numbers and more. Therefore, it’s essential that you have a … Read more

There are some simple Group Policy Settings, which if appropriately configured, can make your network far safer than without them. You can make your organizational network safer by configuring the security and operational behavior of computers through Group Policy (a group of settings in the computer registry). Through Group Policy, you can prevent users from accessing specific resources, run scripts, and perform simple tasks such as forcing a particular home … Read more

According to a new report by Gemalto, published in “The Journal”, the number of breaches in the education sector during the first half of 2017 has doubled compared the previous year. 118 successful attacks in the education sector accounted for 13% of all breaches in that period. As per a Ponemon Institute study, malicious attacks, human error and process failures are the main causes of data breaches in the education … Read more

Whether you’re an intern, an employee, a partner, or the CEO; most employees use email as their primary form of communication both internally and externally. Due to the amount of critical and sensitive information shared via this medium, it’s important to have some sort of visibility over who’s accessing mailboxes. Most cyber-criminals target valuable data stockpiled in multiple computers and servers in your IT infrastructure. Exchange Server deployments in your … Read more

Government sector CIOs are under mounting pressure to stay up-to-date with an ever-changing security threat landscape. With the rise of hacktivism over the last few years, attacks have been more creative in their approach. The recent growth in government data breaches is proof that common cybersecurity measures are becoming increasingly ineffective against modern cyber-attacks. Back in 2016, the U.S. presidential election was impacted by substantial cyber threat activity, most notably … Read more

According to the Data Breach QuickView Report – published in January 2017 – the total number of breaches reported during 2016 was a whopping 4,149! However, for all we know, this may just be the tip of the iceberg. In October, 2016, Uber experienced a pretty serious data breach in the US. Not only did Uber know about it, they actually paid $100,000 to the culprits to delete the data … Read more

Staying compliant with regulations like GDPR is essential if you want to appease that pesky auditor, but it does not guarantee full protection against data breaches. Once you have worked out how to be compliant, you will then have to turn your attention to other important factors in data protection. The reason for this, is that regulations and compliances alone do not guarantee the required shift in attitude that is … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.