dcsimg

Privileged Access Management (PAM): Where to Start

Privileged Access Management (PAM) is something that many organizations still struggle with on a day to day basis. One of the biggest reasons that this happens is because organizations do not prepare their Active Directory environment properly before starting their PAM project. What is Privileged Access Management (PAM)? Privileged Access Management (PAM) solutions usually center around an … [Read more...]

Focusing Solely on Regulatory Compliance Could Make Your Data Less Secure

Of course, complying with data protection regulations is necessary if you want to avoid hefty fines and costly lawsuits; however, many organizations hold on to the belief that if they are compliant, they are automatically immune from cyber-security threats. Since the threat landscape is dynamic and continuously evolving, our approach to dealing with security threats must reflect this and adapt … [Read more...]

We Can’t Comply with the GDPR if We Can’t Manage Our Unstructured Data

It is crucial that companies across the globe understand the difference between structured and unstructured data, if they want to remain compliant with the many data protection laws and regulations that govern them. Structured data, as the term would suggest, is data that is structured in a deterministic fashion. An obvious example of structured data would be a database, where each record has a … [Read more...]

How HIPAA Affects the Newest Healthcare Trends

Compliance mandates are (intentionally) stringent and difficult to meet. The reasons behind this are to force organizations to apply the strictest data security policies to ensure that customer data is secure. The Healthcare Insurance Portability and Accountability Act (HIPAA) is no exception to this rule. In many ways, due to the evolving use of technology in the healthcare industry, HIPAA … [Read more...]

3 Ways Data Discovery and Classification Improves Data Security

Simply put, data discovery is the process of locating where your data resides within your core infrastructure, databases and siloes. Classification is then the process of labelling that data logically to give context and an understanding of the type of information itself. For example, a file containing passport details could effectively be labelled as PII (personally identifiable information) and … [Read more...]

Is GDPR Working to Increase Data Security?

It’s been almost five months since the GDPR was enforced and, on the face of it, the world took notice and realized the importance of compliance. Regulatory bodies and governments even began to make their own data protection regulations tighter in line with the new requirements, such as the UK government did with the Data Protection Act. With the GDPR, in effect, up and running, you would expect … [Read more...]

Automation is the Key to Effective Cybersecurity

The word “cyber-criminal” conjures up a picture of a computer nerd, sitting alone in their basement, iterating through passwords in an attempt to gain access to some top-secret files. However, these days, the reality is that many “cyber-criminals” are actually just automated bots seeking vulnerable systems to exploit. If we are to tackle the issue of cyber-crime, we need automated solutions in … [Read more...]

Why Privileged Accounts Are A Gateway to Cyber Attacks

Thanks to more widespread reporting in mainstream media outlets, it is no longer rare to hear about data breaches causing serious damage to your organization. We are also finding that it is becoming more common to hear about cyber-attacks perpetrated by people from within the organization than from outside hackers. This is because your users, and in particular your most privileged users, are the … [Read more...]

Do Disabled and Deleted Accounts in SharePoint Create a Security Risk?

Many organizations, at some point in time, require contractors or third-parties to work alongside their employees on particular tasks. To ensure that they have access to everything within the system that they require to do their job, they are awarded the required privileges through a user account in Active Directory. They can then collaborate with employees in the organization through SharePoint … [Read more...]

How Data Access Governance Compliments Privileged Access Management

It’s that time of year when you might be expecting many of your employees (some of which will be privileged users) to take some well-earned holidays. In their absence, much of the work is delegated to other members within the organization or even to contractors in some cases. In the case of your privileged users, for this to happen, often temporary access needs to be provided. Managing this … [Read more...]