Archive for the ‘Data Security’ Category

According to Verizon’s 2017 Data Breach Investigations Report, 25% of data breaches involve insiders. And in 60% of cases, insiders take data to sell later, or 15% to a new employer or to start a rival company. Data theft doesn’t necessarily require any technical skill if users already have access to the information they need, and can be detected or prevented using logging, monitoring large data transfers and removeable USB … Read more

“The fact that a company hasn’t noticed a breach doesn’t mean that it hasn’t been breached” – An APT is a type of malware which uses social engineering or various phishing techniques to gain access to a network. Once the malware has gained access, it will conceal itself by hiding in unsuspected files, where it can remain undetected for weeks, months, or even years. In which time, it is … Read more

Since 1998, we have relied on the Data Protection Act (DPA) to provide us with a regulatory framework for protecting personal data. It has been effective to some extent, however, I think it is fair to say that an upgrade is long overdue. After all, so much has changed in the last 20 years. There are many more businesses processing personal data, technology has evolved beyond recognition, and cyber-attacks are … Read more

Real-time data monitoring is more than just a routine security exercise; if done correctly, it can help you to stop security threats altogether. Tracking data in real-time is essential to ensure security, as it gives security professionals the capability to watch over and manage organizational data access. In this article, I will discuss why real-time data monitoring is essential and how Lepide Data Security Platform can help you achieve it. … Read more

In an IT environment, privileged user accounts are those which are provided comparatively more privileges or permissions than a normal user account. Any malicious activity conducted, either intentionally or mistakenly, by a privileged account can be a threat to IT security. To address this, a systematic way of determining which users have privileged access and tracking their activities is required. Methods to Identify Privileged Users Follow these methods to identify … Read more

It seems that almost every month we are told of yet another high-profile security breach in which sensitive data is leaked, either for profit or accidentally. In almost every case, the end result of these data leaks is damage to the reputation and/or bottom line of the organisations involved. Whilst there is no way to completely remove the risks of a data breach occurring in your organisation, there are certain … Read more

The danger posed by insider threats Many organisations with budgets allocated towards security choose to spend them on defending against external attacks and ignore the far more prevalent insider threat. This tends to be due to the fact that, in the past, external hacks were heavily publicised in the media and resulted in expensive damages to company reputations and bottom lines. However, despite recent major ransomware attacks throwing the spotlight … Read more

Windows File Server act as a repository of files and folders, which can be accessed by many users. Though there are many benefits to a collaborative work environment, preventing unauthorized access by tracking permissions to shared folders can become tricky. In this article, we will show you how to detect shared folder permissions on Windows File Server using our award-winning Lepide File Server Auditor (part of Lepide Data Security Platform). … Read more

As IT environments become increasingly more complex and interconnected, and the number of reported cyber-attacks continue to rise, organisations must have some form of data breach prevention strategy in place. According to a recent report by the Ponemon Institute, the average cost of a data breach is estimated to be $4 million, with each compromised record costing around $158. How Does a Data Breach Happen? A recent report published by … Read more

SIEM stands for Security Information and Event Management, and plays an important role in data security. SIEM applications and services are typically capable of aggregating data from various sources, searching through logs, spotting anomalies and patterns, and providing long-term data retention, which can be used to assist with forensic investigations. Additionally, SIEM solutions provide automated alerts and reports, which are presented via an intuitive dashboard etc. As IT systems become … Read more