The Complete Guide to Ransomware [Updated for 2022] Download eBook
Archive for the ‘Data Security’ Category

A Data Subject Access Request (DSAR) is a formal request sent to an organization by an individual who wishes to find out what information has been collected and stored on their behalf. The individual (subject) can also ask for their data to be changed in some way – perhaps if the data is inaccurate or out-of-date. They should also have the option to opt-out of future data collection activities. In … Read more

Microsoft OneDrive is one of the most popular cloud storage platforms on the market. Documents stored in OneDrive can be easily accessed, shared, and synced, anytime and from anywhere. Given that cloud services account for the largest source of Microsoft’s revenue, data security is clearly very important to them. However, since the majority of data breaches are the result of negligent or malicious insiders, they can only do so much … Read more

Increasingly more companies are moving from their on-premise environment to Microsoft 365 as it is feature-rich, flexible, scalable, and accessible. Microsoft 365 enables users to seamlessly collaborate on projects anytime and from anywhere. During the early years of cloud adoption, companies were rightly concerned about Microsoft 365 security; in particular the implications of storing sensitive data on a server that they don’t control. And even though we have seen significant … Read more

SQL Server has many security features that you should review and configure according to your needs, as using the default security settings may leave holes in your security posture. SQL Server Security Best Practices Below are some of the most notable SQL Server security best practices that you should follow to keep your sensitive data secure: Harden Your Windows Server Environment Before reviewing your SQL Server security settings, you will … Read more

An attack path refers to the route attackers take to gain full control of an IT environment. Attack paths are particularly relevant to Active Directory as it is the most popular directory service on the market. This gives adversaries more targets to choose from, and more tools to exploit vulnerabilities. Secondly, and perhaps more importantly, it is because a typical Active Directory environment consists of very complex hierarchies of groups … Read more

An Intrusion Detection System (IDS) is a network monitoring solution that detects and alerts suspicious network traffic. The relevant personnel can investigate the alerts to determine whether they need further attention. An Intrusion Detection System can be either host-based or network-based. Host-Based IDS (HIDS) A host-based Intrusion Detection System is installed on endpoints, as opposed to being installed on the network perimeter. A HIDS serves to protect the endpoints from … Read more