Archive for October, 2017

In the run-up to Halloween this year, we thought we would share with you some of the scariest data breaches from around the world that have occurred so far in 2017. So, lock the doors, turn off the lights and grab a pillow to hide behind…it’s time to explore the spookiest true data breach stories of 2017 so far. E-Sports Entertainment Association Fan of Counter-Strike, Half Life or Warcraft III? … Read more

To any of you following our blog this year (you can subscribe using the form to the left of you right now!), you know that we have reached this conclusion already. But now it has been confirmed by none other than the National Audit Office themselves; the “WannaCry” ransomware attack that crippled much of the NHS in the UK could have been avoided by following simple IT security best practices. … Read more

Before reading this article, you may be asking yourself: Do I even need a GRC solution? The simple answer is yes. An ever-changing regulatory landscape, combined with numerous high profile security breaches, has helped create awareness amongst companies about the critical role GRC solutions play. Not employing GRC solutions could leave your network environment without the flexibility needed to keep exposure and vulnerability in check. In this blog, I’ll explain … Read more

Dial in on malicious modifications Devastating threats, such as Ransomware and Malicious Insiders, are knocking at your door. Global ransomware damage costs will exceed $5 billion in 2017, up from $325 million in 2015, says the Ransomware Damage Report from Cybersecurity Ventures. Sixty-two-percent of insider threats involve employees profiting from sensitive company data, says “Understanding Insider Threats” from Gartner. Increasing cyberattacks are forcing organizations like yours to find solutions that … Read more

It may shock you to learn that over 75% of employees require privileged access rights to complete their current job requirements, but 49% of organizations do not have policies for assigning this access. In 2017! It’s time that organizations got serious about privileged account security, as the number of data leak incidents that occur through insider threats increases every year. The sad reality is that, according to the 2017 Insider … Read more

The healthcare sector was a lucrative target for hackers in 2016, and unfortunately 2017 doesn’t appear to be any different. According to “The Identity Theft Resource Center,” 238 healthcare breaches have been reported so far this year. The most noticeable breach regarding the numbers of patient records impacted was a ransomware attack in Women’s Healthcare Group of Pennsylvania, cited by the HIPAA Breach Reporting Tool website. In this one incident, … Read more

After reading this article, I have no doubt that you will be convinced you need a data loss prevention program. We all know that data leakage can be damaging for both the reputational and bottom line of any organization. We also know that if we do not have sufficient security measures in place, then a data loss incident is likely. Even though we are well-aware of these dangers and data … Read more

Owing to its sheer size and complexity involved in its management or administration (especially by multiple persons), Active Directory is often plagued with security issues. With digitalization making headlines, the rapid pace at which most enterprises are embracing the latest technologies has necessitated the expansion of security and networking services. Implementing a proactive auditing solution, like LepideAuditor, which gives you granular visibility over all events, can help you spot any … Read more

According to a recent Cyber Security Breaches Survey, carried by out Ipsos MORI, only 43% of businesses reported their most disruptive breach outside their organisation. Even then, they would commonly report the breach to an outsourced cyber security provider, in the hope that they can offer a resolution. Of the 26% of breaches that were reported eternally, the majority of those breaches (28%) were reported to banks, building societies, and … Read more

I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands. As an IT manager; you need to be doing everything you can to ensure the integrity of your data. If you’re wondering how best to do this, I’d suggest you start right here. Listed below are some of our … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.