The Complete Guide to Ransomware [Updated for 2022] Download eBook
Archive for the ‘IT Operations’ Category

An information security policy (ISP) is arguably the most important cybersecurity policy an organization can have. Essentially, an ISP defines the protocols and procedures for identifying, evaluating, mitigating, and recovering from security threats. An ISP is data-centric, in that its main objective is to protect data confidentiality, integrity, and availability (known as the CIA triad). An ISP will cover a broad range of areas including access control, data classification, security … Read more

In this quick guide, we will show you a few methods of how you can enable Active Directory Recycle Bin to restore deleted AD objects along with their attributes. Let’s get started! Using the AD Recycle bin to Restore Deleted Objects Authoritative restore is the preferred method for administrators to restore accidentally deleted or corrupted AD objects (such as users, groups, computer accounts, and OUs). With Windows Server R2, administrators … Read more

While it may be true that the majority of insider threats are actually the result of negligent/naive employee’s, rogue employee’s still account for 22% of insider-threats, according to the 2017 insider threat intelligence report. And should a rogue insider find a way to circumvent an organisation’s security controls, the impact of the breach could be far more severe. Below are 5 important questions organisations need to answer if they want … Read more

Privileged user accounts are the ultimate goal for cyber attackers. Once attackers have privileged access, stealing sensitive information is a breeze. In many cases, attackers patiently claw and scrape their way up the access ladder from low-level accounts up to administrative ones. IT administrators regularly face challenges identifying who has privileged access to Active Directory environment, as well as managing new privileged users. The goal of this blog post is … Read more

Deploying defenses to protect against outside threats may seem more natural than protecting yourself against your own employees. However, we now know that attacks from malicious insiders are by far the most damaging to your organization. In the light of this, identifying malicious insiders should be number one on your list of priorities when it comes to IT security. Segregating Malicious Insiders Insider threats are people who have been entrusted … Read more

As you can imagine, a company’s inability to locate their critical assets is a big problem for security. After all, should an attacker gain access to, and disclose a company’s sensitive data, this could be devastating for the company’s reputation and financial well-being. Despite the risks, there’s still a large number of companies who simply don’t know where their data is stored. According to a report by the Institute of … Read more