dcsimg

How Does Data Classification Help Healthcare Providers in the USA?

Healthcare in the USA is an enormously competitive industry where regulatory oversight is strict and encompasses all manner of activity. On top of that, the needs of healthcare organizations are extremely complex and the importance of the services they deliver mean that processes and practices need to be as streamlined as possible. Due to the sensitivity of patient data, it is vital that … [Read more...]

5 Easy Ways to Improve Office 365 Security

Office 365’s Advanced Threat Protection (APT) may be a useful way to improve the security of the platform, but it is not without its flaws. Security researchers discovered back in 2018 that Office 365 APT had some fundamental flaws when it came to defending against a new wave of phishing attacks. It seems as though SharePoint invitations containing malicious links were being sent out to some … [Read more...]

What is an AdminSDHolder Attack and How to Defend Against it?

In this blog, we will be going through how the AdminSDHolder object in Active Directory can be used in Active Directory attacks. We will also go through what you can do to help defend against AdminSDHolder attacks and how LepideAuditor can help make this process easier. What is an AdminSDHolder? Essentially, the AdminSDHolder is an object in Active Directory that acts as a security descriptor … [Read more...]

The Ins and Outs of Data-Centric Security

We’ve said it many times before, but it is worth emphasising; organizations need to be doing more about securing their data from the inside-out. Currently, as has been the case for numerous years, organizations are spending too much on perimeter security (which is, of course, important) and forgetting to focus on the thing that matters the most, the data itself. We speak to many organizations that … [Read more...]

What’s the Difference Between Share and NTFS Permissions?

Both share and NTFS permissions serve the same purpose within Windows environments; namely, to help you prevent unauthorized access to your critical folders. However, there are some critical differences between the two that will determine which one you use. In this blog we will learn about what share permissions and NTFS permissions are, what the differences between the two are and the best … [Read more...]

Does HIPAA Compliance Actually Help Protect Sensitive Data?

Back in 2009, the Health Insurance Portability and Accountability Act (HIPAA) was combined (or updated) with the Health Information Technology for Economic and Clinical Health Act (HITECH) to increase its strictness in line with social and technological advances. Despite this, many still claim that HIPAA does not go far enough to secure patient data, and the increasing regularity with which we see … [Read more...]

5 Active Directory Changes You Need to Audit

Active Directory is a critical part of any organization’s IT infrastructure. Unwanted changes in Active Directory could result in potentially disastrous consequences for the security of data. Changes to user accounts, passwords, group memberships and more could lead to excessive permissions and increased risk of privilege abuse. For those reasons, and more, it is essential that you continuously … [Read more...]

Are Organizations Failing When It Comes to the Principle of Least Privilege (PoLP)?

The idea of Least Privilege has been floating around for many years now, and most IT/Security teams are well versed in why it is important and what it takes to implement. However, recent data breaches suggest that simple least privilege principles are not followed by a significant proportion of organizations. If you want your data to be secure, you need to have implemented a strict least privilege … [Read more...]

Active Directory FSMO Roles: What Are They and What Do They Do?

Active Directory (AD) is pretty much the go to domain authentication services for enterprises all over the world and has been since its inception in Windows Server 2000. Back then, AD was pretty unsecured and had some flaws that made it particularly difficult to use. For example, if you had multiple domain controllers (DCs), they would compete over permissions to make changes. This meant that you … [Read more...]

Privileged Access Management (PAM): Where to Start

Privileged Access Management (PAM) is something that many organizations still struggle with on a day to day basis. One of the biggest reasons that this happens is because organizations do not prepare their Active Directory environment properly before starting their PAM project. What is Privileged Access Management (PAM)? Privileged Access Management (PAM) solutions usually center around an … [Read more...]