It’s time we turn our attention to monitoring and alerting on changes and suspicious behavior in your Active Directory environment. This is part 4 of my National Cyber Security Awareness Month series focusing on Active Directory security guiding…
It’s time we turn our attention to monitoring and alerting on changes and suspicious behavior in your Active Directory environment. This is part 4 of my National Cyber Security Awareness Month series focusing on Active Directory security guiding…
Even with the best defenses, an attack or egregious accident can happen to your Active Directory; therefore you need to be prepared to quickly investigate, remediate and recover. Sadly, attacks today have taken a decidedly ugly turn, seeking the total…
If you get Group Policy management WRONG – even for just one Windows system with a seemingly innocuous setting, then you can inflict massive detrimental effects to the security posture of thousands of systems in your network within minutes.
With…
“Ask not what your country can do for you, ask what you can do for your country.”
We are all born with a desire to accomplish something bigger than ourselves; but none of us are imbued with the powers of the Tesseract, nor…
DC in the cloud
There could be many different reasons that require Domain Controller running in the cloud:
Security information and event management (SIEM) solutions have been around for many years now. Early adoption of the technology was driven by mandates like HIPAA, SOX and PCI DDS, since SIEM solutions provided the monitoring and reporting that enterprises…
The cyber-security community is buzzing about this recently unveiled vulnerability in Windows Textservices Framework.
"Project Zero: Down the rabbit hole" https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html by a security researcher…
Do you have your accounting software, electronic health record system or document management system hosted on a server? If you are running Terminal Server, Microsoft Azure, Remote Desktop, Citrix, VMware or any of the other virtual desktop environments…
We are living in a new age, where businesses make regular use of a range of tools and strategies that run on smartphones, tablets, internet-of-things (IoT) sensors, bring-your-own-device (BYOD) programs and more. People can access corporate data and perform…
Has your IT environment outgrown your system imaging approach? It’s no longer workable to simply capture a particular hardware and software configuration at a specific moment in time. A smarter approach to systems imaging these days is to layer atop…
Extra... extra… read all about it!
Data Breaches are the New Reality! Are you Prepared?
It's no surprise (yet frightening) that there is a drastic increase in news headlines that emphasize the security risks and challenges IT professionals face…
Active Directory (AD) is the beating heart of any Microsoft environment — authenticating users, authorizing access to resources and much more. A critical part of AD is Group Policy, which provides centralized management and configuration of operating…
As your workplace has become more and more mobile, are you struggling with increased security threats and compliance concerns? It’s happening across all sectors and geographic regions. A recent Gallup survey of more than 15,000 adults found that 43 percent…
With exponential data growth across most organizations in all sectors, backup and recovery processes have become cumbersome and time-consuming — not to mention the drain on performance. Maybe you’ve already seen the stats put out in Domo’s recent …
Education institutions are required to keep pace with technology growth, but are often only given a shoestring budget to achieve it. Endpoint management is typically tracked manually using Excel files or with multi-point solutions. Before Antioch Unified…
In my previous blog post, I explored the first step in mitigating the insider threat — understanding and controlling privilege across the environment — and reviewed how Quest Enterprise Reporter Suite, Security Explorer and Change Auditor
…What images does the phrase “insider threat” conjure up in your mind? A disgruntled admin actively sabotaging your systems just before penning a resignation letter? A highly privileged contractor installing spyware that will keep exporting sensitive data…
You’ve undoubtedly put a variety of defenses in place to limit the ability of attackers to enter your network — but attackers are notoriously clever and persistent little devils. On the one hand, they barrage your network with brute-force attacks…
IT security predictions are a dime a dozen nowadays, but, for Windows and Office 365 professionals, what you really want is a glimpse into the future for ALL aspects of your role: security, scripting, reporting, provisioning, auditing, migrating and…
Many people think of Quest KACE solutions as beneficial to IT departments within medium-sized or large organizations. But KACE can also be a lifesaver for managed service providers (MSPs).
MSPs have a lot on their plates. Remote IT asset management for…
Late last week, the Centers for Medicare and Medicaid Services (CMS) disclosed that compromised insider credentials with access to HealthCare.gov's back-end insurance system exposed 75,000 individuals’ data.
What is 75,000 records in the face …
Do you know where all of your IT vulnerabilities are? Maybe you have a bring-your-own-device (BYOD) program. Perhaps employees are using company-issued smartphones and tablets and laptops. And maybe you have begun to employ internet-of-things (IoT) technologies…
As technology has helped simplify so much of our work and personal lives, the IT systems supporting that technology have only become more and more complex. In addition, the risk of IT disaster has increased exponentially because of the proliferation…