Archive for Author: Amritesh Singh

Attackers are persistent in their pursuit to compromise Active Directory services due to their role in authorising access to critical and confidential data. As organisations expand, their infrastructure becomes increasingly more complex, which makes them a lot more vulnerable to attack as it is harder to keep track of important system changes, events and permissions. It’s also becomes a lot harder for organisations to determine where their sensitive data is … Read more

Configuration drift is a naturally occurring phenomenon whereby configuration items (CIs), such as computers or devices on an organisation’s network, drift towards an inconsistent state. This problem occurs on both private and cloud-based networks. While there are a number of causes of configuration drift, it’s essentially the result of conflicting changes made to device’s, software, services and configuration files, which are not systematically monitored by the IT department. It is … Read more

The overall cost to the UK economy from cyber-crime alone is well over £20 billion, and businesses are the ones that feel the effects the most. Every year we see stories of network attacks, yet it appears that many businesses are still not taking steps to mitigate the risks. Surveys suggest that most companies that face a significant security breach go out of business within a year. The average cost … Read more

The GDPR is an EU regulation that will come into effect from 25 May 2018. The new directive aims to ensure that organisations have policies and procedures put in place to protect the data of EU citizens. Below is a checklist that is designed to assist organisations in complying with the GDPR. Awareness All employees, whether they are IT staff, executives, general administrators, consultants, sales and marketing executives, human resource … Read more

Account lockouts are a common problem experienced by Active Directory users. They arise because of Account Lockout Policies configured in the default domain policy for the Active Directory domain. In this article, we will go through some of the root causes of the account lockouts and the way to simplify the troubleshooting process. Common causes of account lockouts Mapped drives using old credentials: Mapped drives can be configured to use … Read more

The Active Directory is arguably the most important part of any organization’s IT infrastructure. It’s important to be vigilant when it comes to monitoring and alerting on any changes made to this system so that you can spot any changes that may have been made in error or are damaging. Occasionally, objects can be deleted by mistake or administrators may delete objects that have been created for test purposes. Whatever … Read more

All organizations should be able to immediately see what’s happening to their files/folders and when it is happening. With security breaches becoming more common, and compliance mandates becoming more prevalent, the requirement to ensure you have adequate auditing on your file/folders is more important than ever before. In this article we will show you how to audit your file/folder level access using native tools in three steps: A). Enabling the … Read more

There’s certain phrases that are guaranteed to strike fear in hearts of IT admins everywhere. They are all too familiar and they invariably mean wasted time, more stress or late evenings at work. Here’s our top 10 spinetingling things for IT admins to hear: “I’d just got a coffee, put it next to my keyboard and somehow…..” “I know you’re busy but could I just get you to have a … Read more

Passwords have for a very long time been used to prove identity and authenticate user access to resources. As time has gone by, to increase security we have made password requirements more complex and frequently changing passwords a necessity. However, in the pursuit of better security we have ignored the very fact that made password-based security preferable over other approaches – its simplicity. Asking for increasingly complex passwords and then … Read more

Self-service password reset solutions are a great way to reduce the work of IT departments and help desk administrators. According to a recent study conducted by system analysts, 30% of the queries which are sent to the IT helpdesk are related to password and account management only. These queries not only increase the workload of IT departments, but are also a cause of reduction in productivity. Such organizations can get … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All Trademarks Acknowledged.