dcsimg

What to Look for When Monitoring File Activity on File Server

Monitoring file activity is not as straight forward as it sounds. After all, in order to detect and respond to suspicious or troublesome file activity, we need to know in advance what it is we are actually looking for. Below are 8 of the most common scenarios that can compromise either the security or integrity of our critical files, along with a brief summary describing how LepideAuditor can help … [Read more...]

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. Therefore, in this article, I will review … [Read more...]

Why you Shouldn’t Use FTP to Transfer Cloud Files

The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT teams, this has been a boon. The cloud offers a level of flexibility and capability most on-premise systems could only dream of. … [Read more...]

New Survey Reveals the Importance of Cybersecurity Automation

These days enterprises are dealing with vast amounts of unstructured data – a problem that is compounded by the increasing number of ways to share this data. Despite this, both employers and employees are still failing to either understand or care about their responsibilities when it comes to data protection. According to research carried out by Opinion Matters – an independent … [Read more...]

A guide to implementing and auditing ISO 27001

Information is one of your organisation’s most valuable assets. The objectives of information security are to protect the confidentiality, integrity and availability of information. These basic elements of information security help to ensure that an organisation can protect against:  sensitive or confidential information being given away, leaked or otherwise exposed, both … [Read more...]

Parallels and Corel Team Attending GITEX Technology Week 2019

IT professionals, technology specialists and service providers in the Middle East are preparing for GITEX Technology Week 2019, the biggest tech show in the Middle East, north Africa and south Asia. Over 100,000 attendees from 140 countries will come together to unpack the big conversations and latest solutions around 5G, future mobility, artificial intelligence (AI), GITEX lifestyle tech, mind … [Read more...]

Domain Controllers Overview

<p><a href="https://www.solarwindsmsp.com/blog/network-authentication-methods&quot; target="_blank">Authentication</a> is an essential function for a computer network, helping ensure that only authorized users have access to the system. As a managed services provider (MSP), authentication is a key element of helping ensure your customers’ data is secure and … [Read more...]

YouTube ordered to cough up $170M settlement over COPPA infraction

Last week, the Federal Trade Commission (FTC) announced that it has required Google and YouTube to pay a settlement fee totaling $170 million after its video-sharing platform was found violating the Children’s Online Privacy Protection Act (COPPA). The complaint was filed by the FTC and the New York Attorney General, with the former set to receive the penalty amounting to $136 million and the … [Read more...]

3 Data Backup Tools Worth Considering

If you are a small or medium business, you may have left your data backups in the hands of outside help or, even worse, to chance. … [Read more...]

SHA-256 Algorithm Overview

<p>Encryption is a critical part of modern computer security. Read More … [Read more...]