Upcoming Webinar       The Complete Guide to Ransomware [Updated for 2022]       26th May, 2PM EDT      Register Now
Archive for the ‘IT Operations’ Category

  An information security policy (ISP) is arguably the most important cybersecurity policy an organization can have. Essentially, an ISP defines the protocols and procedures for identifying, evaluating, mitigating, and recovering from security threats. An ISP is data-centric, in that its main objective is to protect data confidentiality, integrity, and availability (known as the CIA triad). An ISP will cover a broad range of areas including access control, data classification, … Read more

In this quick guide, we will show you a few methods of how you can enable Active Directory Recycle Bin to restore deleted AD objects along with their attributes. Let’s get started! Using the AD Recycle bin to Restore Deleted Objects Authoritative restore is the preferred method for administrators to restore accidentally deleted or corrupted AD objects (such as users, groups, computer accounts, and OUs). With Windows Server R2, administrators … Read more

While it may be true that the majority of insider threats are actually the result of negligent/naive employee’s, rogue employee’s still account for 22% of insider-threats, according to the 2017 insider threat intelligence report. And should a rogue insider find a way to circumvent an organisation’s security controls, the impact of the breach could be far more severe. Below are 5 important questions organisations need to answer if they want … Read more

Privileged user accounts are the ultimate goal for cyber attackers. Once attackers have privileged access, stealing sensitive information is a breeze. In many cases, attackers patiently claw and scrape their way up the access ladder from low-level accounts up to administrative ones. IT administrators regularly face challenges identifying who has privileged access to Active Directory environment, as well as managing new privileged users. The goal of this blog post is … Read more

Deploying defenses to protect against outside threats may seem more natural than protecting yourself against your own employees. However, we now know that attacks from malicious insiders are by far the most damaging to your organization. In the light of this, identifying malicious insiders should be number one on your list of priorities when it comes to IT security. Segregating Malicious Insiders Insider threats are people who have been entrusted … Read more

As you can imagine, a company’s inability to locate their critical assets is a big problem for security. After all, should an attacker gain access to, and disclose a company’s sensitive data, this could be devastating for the company’s reputation and financial well-being. Despite the risks, there’s still a large number of companies who simply don’t know where their data is stored. According to a report by the Institute of … Read more

Seems nowadays that there’s a new data breach every day in the mainstream news. The sheer volume of highly publicized data security breaches serve as an important reminder that data access governance must be a major part of your ongoing security activities, and not a one-time thing. It’s about time organizations got serious about governing access to their critical business data and reducing the likelihood of a potential data breach. … Read more

Having a hard time managing massive volumes of data logs? You’re not alone. Dealing with data collected from numerous hosts within an enterprise is often a daunting task for admins. Since a single security breach can have a far-reaching impact throughout the business, many companies are investing in SIEM solutions for threat management and compliance requirements. However, we’ve had many people come to us and say that SIEM didn’t help … Read more

Account lockouts are a common problem experienced by Active Directory users. They arise because of Account Lockout Policies configured in the default domain policy for the Active Directory domain. In this article, we will go through some of the root causes of the account lockouts and the way to simplify the troubleshooting process. Common Causes of Account Lockouts 1. Mapped drives using old credentials: Mapped drives can be configured to … Read more

The Active Directory is arguably the most important part of any organization’s IT infrastructure. It’s important to be vigilant when it comes to monitoring and alerting on any changes made to this system so that you can spot any changes that may have been made in error or are damaging. Occasionally, objects can be deleted by mistake or administrators may delete objects that have been created for test purposes. Whatever … Read more