Archive for the ‘Data Security’ Category

I was looking over the definition of secure the other day and found the following entry: v. fix or attach (something) firmly so that it cannot be moved or lost And then I applied it to security initiatives within IT. The goal aligns well; you want to fix (read: configure) your network so that the security controls you put in place doesn’t are not “moved or lost” – that is, … Read more

For users of the controversial adultery dating site Ashley Madison, July 15, 2015,  was a black day indeed. The Canadian organisation reported on that day that an eye-watering 37 million users had had their most personal of personal data leaked. An embarrassment of phenomenal magnitude for any site of its nature but an off-the-charts disaster for an organisation so reliant on secrecy.  A 9.7 GB encrypted file that hackers threatened … Read more

Organization’s computer systems hold sensitive information which can be conceded in various ways, like; malicious or unintentional actions, or through the failure of software or electronic components. Malicious attacks or cyber-attacks causes an immense amount of damage to organization’s integrity and security. Hacking of organization’s data through cyber-attacks are increasingly communal today. Cyber-attacks and their subsequent safety breaches are a part of swiftly growing international cyber hazard that outlays companies … Read more

Compromising Domain Controllers (DC) is equivalent to endangering the entire Active Directory. The logic behind this is simple—when an attacker gets access to the Domain Controller, he will be able to access and change everything related to the AD domain. A hacker who has got access to Domain Controllers may: cause damage to AD DS database access the security database and the information therein leak the security configuration information change … Read more

Are you a Windows administrator in charge of the IT network of the organization? There are chances that you make mistakes on many fronts. But don’t worry. You are not alone. We here will tell you the most common mistakes that IT administrators fall prey to. 1. Not planning IT infrastructure and resources As an administrator you can ignore planning only at your own peril. You are in charge of … Read more

Security Auditing of an enterprise – whether in an extremely large organization or a smaller one is one of the most important concern pertaining to protect your confidential or private data from hackers eyes. Unauthorized file access, falsification and even deletion and modification of files & folders has become a common phenomenon in organizations where it becomes difficult to audit events, track malicious user actions & monitor illegal access.

Are you using domain administrator accounts to manage Active Directory (AD) or support end-user devices? Here are some tips and best practices to help improve security and change control. It’s a common scenario. A new employee joins the IT department, and the first task is to provide them with access, often in the form of an account with domain administrator privileges. I’ve always found it somewhat curious that organizations often … Read more

Investing in securing data at rest on servers, and over-the-wire encryption is vital, but unless the devices used to access data are also effectively secured, all other efforts might be in vain. Many organizations consider their most important IT assets to be the servers that process the data that the business couldn’t operate without, employing sophisticated defenses to provide protection, including products such as Lepide Data Security Platform. But ignoring … Read more

Well, you may think what security risk has to do with holiday season, but there exist a correlation, read on to know how! Most of the organizations small, medium and enterprise levels invest in security still many a time they find themselves at the receiving end. The reason could be, while they could be doing a lot at one end but they tend to ignore other security risks that they … Read more

Eventlog.pl is an event log management script tool which comes with Windows 2000 Resource Kit Supplement and is used to manage the Event Viewer logs of Windows 2000 based systems. This script tool can be used to perform various event log management tasks like changing properties of the event logs, backing up the log files exporting the event lists to text files, deleting all events from the logs and querying … Read more