Archive for the ‘Auditing’ Category

Accordingly to a recent report by rightscale.com, 93% of organizations are using cloud computing in some form or another. This is hardly surprising as cloud solutions are becoming increasingly more affordable and easier-to-use. These days, companies can actually save money by switching to the cloud, as they don’t need to manage and maintain their own infrastructure, which would require hiring a specialized technical support team. Businesses can benefit from the … Read more

More than three quarters of enterprises have at least one application (or a portion of their enterprise computing infrastructure) in the cloud. In fact, enterprises predict that their cloud spending will exceed $3.5 million in 2018. These statistics, taken from the 2018 Cloud Computing Study, would certainly suggest that the previous concerns surrounding cloud cybersecurity are becoming less prevalent. However, this does not mean that organizations are adequately securing their … Read more

Should an attacker gain access to your Active Directory (AD), you could find yourself in a lot of trouble as AD serves as the gatekeeper to your critical assets. It is imperative that you have as much visibility as possible so that you can quickly recognise and respond to any suspicious behaviour that takes place on your network. Sure, AD will generate event logs which you can scrutinize in order … Read more

One of the most important ways to address your cybersecurity in today’s threat landscape is to ensure you know how your users are interacting with your sensitive data. By sensitive data, we’re referring not just to data containing company secrets or financials, but also to consumer and employee data. Personally identifiable information (data containing credit card numbers, addresses, names etc.) can fetch a large amount of money on the black … Read more

The cybersecurity market has matured and evolved rapidly over the last few years, and many organizations are struggling to keep pace. A combination of tighter compliance regulations cantered around customer data, the deluge of cyber-attacks making mainstream news and the heightened public awareness of data privacy rights is making it hard for organizations to ignore data security. In fact, all organizations (from SMB to Enterprise) need to now be proactive … Read more

In today’s world, data is everything. Enterprises are now beginning to adopt the approach that data should be at the heart of security strategies. The rapid rate of data creation over the last few years, the increased value of that data, and the relative lag of cybersecurity advancements, has created an opportunity for cyber-attackers. More and more organizations are now turning to Data-Centric Audit & Protection (DCAP) as a method … Read more

Many organizations, at some point in time, require contractors or third-parties to work alongside their employees on particular tasks. To ensure that they have access to everything within the system that they require to do their job, they are awarded the required privileges through a user account in Active Directory. They can then collaborate with employees in the organization through SharePoint Team Site. Permissions are granted to these users through … Read more

It’s no longer a surprise statistic when we say that nearly half of all data breaches occurred as a result of insiders. This is because more and more organizations are starting to understand the fundamental value of data and the potential implications of having large numbers of privileged users. In fact, according to a study conducted by the Ponemon Institute claims that the average cost of a data breach rose … Read more

Every year, increased cloud adoption rates suggest that the overall trust that users have in cloud-based platforms are increasing. This means that more and more organizations in key sectors, such as finance, healthcare and education, are storing sensitive information in the cloud and trusting that it will be secure. However, security controls and visibility into key changes taking place simply isn’t at the same level as some similar on-premise platforms. … Read more

It may not surprise you to learn that user error is one of the biggest risks to your IT security that you can face. In particular, careless or malicious administrators can have a disastrous effect on the integrity of your systems and data. Whether you are an enterprise organization with a team of admins, or a small business with just one, it’s important that you know exactly what they are … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2018 Lepide Software Private Limited. All Trademarks Acknowledged.