Archive for May, 2017

In every organization, Active Directory administrators need to be able to produce detailed reports on user access, object modification, privileged user activities and more. The reason for this may be down to external compliance requirements, IT security, litigation purposes or a combination of all three. Depending on the requirement, the urgency of such reports may vary. For example, if you are tracking Active Directory activities in order to maintain network … Read more

A common misconception is that the vast majority of cyber-attacks are instigated by malicious hackers who deliberately break in to your system to steal your data. While this does happen, the belief that all attacks happen this way undermines the very real threat posed by your very own staff. According to a report published by MacAfee, insiders were responsible for 43% of data loss. Should an organisation fail to acknowledge … Read more

Many IT Administrators find it difficult to implement an in-depth and pro-active File Server Audit strategy. If an important event happens and you want to investigate, you may have to wade through gigabytes of event logs on the Windows devices; which can often be like finding a needle in a haystack. Event logs stored on Windows File Systems are so verbose that deriving meaningful information from them can be very … Read more

According to a recent report by Bitglass, in 2016 there were 328 data healthcare data breaches reported in the US. That’s 60 more breaches than there were in 2015. An estimated 16.6 million US citizens were exposed as a result. The breaches were caused by various hacks, lost or stolen devices, and unauthorized disclosure of sensitive information. However, while the number of reported breaches are increasing, the overall number of … Read more

Privacy by design is a methodology that helps organisations develop projects where privacy and data protection are accounted for from the start. Privacy by design is not a requirement of the Data Protection Act, but has been included in the GDPR specification (Article 23). Instead of incorporating data security measures as an after-thought, privacy and data sharing policies should be developed during the early stages of a project. Doing so … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.