The Complete Guide to Ransomware [Updated for 2022] Download eBook
Archive for the ‘Auditing’ Category

An IT security audit is a comprehensive review of an organization’s security posture, which includes performing an analysis of its infrastructure, processes, configurations, and more. You need to carry out security audits in order to verify whether your existing safeguards are robust enough to meet the challenges of today’s threat landscape. Carrying out security audits will help you identify vulnerabilities, comply with the relevant compliance laws (HIPAA, GDPR, CCPA, etc.), … Read more

The purpose of an information security audit is to assess the current security posture of an organization. Doing so will give the auditors insights into how strong/weak the organization’s defenses are, and what can be done to improve them. Audits can be carried out on a one-time basis, ad-hock, or carried out regularly, depending on the situation. What is an Internal Audit? An internal audit is typically carried out by … Read more

Microsoft’s Windows Event Viewer shows a log of system and application messages. These messages include errors, warnings, and information about certain events that can be scrutinized by the administrator to help troubleshoot problems. Administrators and regular users can open the Event Viewer on a local or remote machine, assuming they are authorized to do so. To open on your local Windows machine, simply type “Event Viewer” into the search box … Read more

As the inevitable shift from self-hosted to cloud-based IT environments continues, Microsoft Office 365 products, such as Exchange Online, are becoming increasingly more valuable to enterprises across the globe. Exchange Online is quickly becoming the go-to solution for managing emails, calendars and contacts, to help your employees communicate and collaborate in a secure manner. There are, however, understandable security concerns relating to storing sensitive data in the cloud, as you … Read more

IT administrators require elevated rights in Active Directory to carry out certain tasks, a fact that we can’t deny. However, should an attacker gain access to a user account in AD with admin-level privileges, they will have free reign to do pretty much anything they choose. They can potentially download a database containing large amounts of PII, or access folders containing valuable company secrets. They may choose to install a … Read more

According to the 2019 Data Exposure Report (DER), commissioned and published by Code42, employees are still considered to be the #1 cause of data breaches. The survey was carried out by independent UK-based research group, Sapio Research, and included 1,028 IT security professionals and 615 business executives from companies across Europe and the United States. When questioned about whether they had experienced a breach, and what they thought was the … Read more