Archive for June, 2017

Windows File Server act as a repository of files and folders, which can be accessed by many users. Though there are many benefits to a collaborative work environment, preventing unauthorized access by tracking permissions to shared folders can become tricky. In this article, we will show you how to detect shared folder permissions on Windows File Server using our award-winning LepideAuditor. Why is it important to track shared folder permissions … Read more

The world woke up on the 28th June to the news of a second global ransomware attack following the WannaCry attack that took place less than six weeks ago, and affected over 230,000 computers in 150 countries; including the UK’s National Health Service. We will refer to this attack as the ‘Petya’ ransomware attack as very little is known about it at this point besides its slight resemblance to an … Read more

As IT environments become increasingly more complex and interconnected, and the number of reported cyber-attacks continue to rise, organisations must have some form of data breach prevention strategy in place. According to a recent report by the Ponemon Institute, the average cost of a data breach is estimated to be $4 million, with each compromised record costing around $158. How Does a Data Breach Happen? A recent report published by … Read more

People generally think that auditing and monitoring are the same thing and, in some ways, they are. The differences between them are subtle, but important none-the-less. In short, auditing is done by auditors, and it is the auditors responsibility to make use of the available technology to aggregate and present the log data in a way that that can be understood and “monitored” by administrators and managers. While most modern … Read more

SIEM stands for Security Information and Event Management, and plays an important role in data security. SIEM applications and services are typically capable of aggregating data from various sources, searching through logs, spotting anomalies and patterns, and providing long-term data retention, which can be used to assist with forensic investigations. Additionally, SIEM solutions provide automated alerts and reports, which are presented via an intuitive dashboard etc. As IT systems become … Read more

Issues relating to data privacy continue to hit the headlines on a regular basis. As such, the European Union have introduced the General Data Protection Regulation (GDPR), which is designed to replace the current Data Protection Directive (DPD). The new regulation will come into effect as of May 2018,. The pendulum is swinging, the alarm bell is ringing, yet many organisations continue to snooze. Of course, it may be the … Read more

Should organisations invest valuable resources hiring specialised security staff, or is there a more effective alternative? According to a recent report over 50% of UK companies have a severe shortage of IT security professionals, and it looks like this shortfall is set to continue. Cyber-attacks are constantly evolving and they often target individuals who are inexperienced and inattentive. And of course, it’s not only external threats that are a concern, … Read more

According to a survey conducted by Cisco, “In the past two years, more than 250 million confidential records were reported lost or stolen”, and many of these incidents were perpetrated by insiders. That’s not to imply that your staff members are crooks, they’re often just careless or ill-informed about the consequences of their actions. To make matters worse, broader data access methods and transportability of data are creating even more … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.