dcsimg

Why It Is Important to Keep an Eye on Your Office 365 Administrators

It may not surprise you to learn that user error is one of the biggest risks to your IT security that you can face. In particular, careless or malicious administrators can have a disastrous effect on the integrity of your systems and data. Whether you are an enterprise organization with a team of admins, or a small business with just one, it’s important that you know exactly what they are … … [Read more...]

LepideAuditor: A Brief Comparison to Native Office 365 Auditing

Office 365 is a feature-rich, cloud-based solution that offers email, instant messaging, file-storage, file-sharing, and a lot more. Office 365 makes it easier for employees to work remotely and facilitates better collaboration on projects. Using a cloud-based service will ensure that you always have the most up-to-date software, and that patches are installed in a timely manner to protect against … [Read more...]

Why it is Important to Know Where Your Data Flows

Under the GDPR, organizations are required to institute measures that enable them to closely monitor the movement of personal data throughout its life-cycle. They must establish a profound understanding about how and why sensitive data is being processed and stored. It would be inadmissible for companies to not know where their valuable physical assets are located. Yet, despite being referred to … [Read more...]

Why Native Auditing Fails When It Comes to Group Policy Auditing

Organizations all over the world rely on Group Policy to control the working environment of both user and computer accounts in Active Directory (AD). However, due complex, scalable nature of Active Directory and the hundreds of available settings within Group Policy, it can be very easy to get it wrong – thus potentially leaving security vulnerabilities or leading to downtime. Due to this … [Read more...]

Improve File Server Security by Delegating Outside of the IT Department

It’s probably safe for me to assume that your Windows File Servers store critical, sensitive information at this very moment in time. In the modern world, data is more valuable than oil, and is now considered to be the most valuable resource in the world. Ensuring that File Server is secure should be high on the list of priorities for any organization that stores sensitive data. Unfortunately, … [Read more...]

4 Steps to Securing Unstructured Data for Compliance

There are two kinds of data that is stored digitally in your organization; structured and unstructured. Unstructured data is data which does not have any sort of pre-defined data model or isn’t organized in a pre-defined way. It usually comprises the majority of the digital information that an organization stores. The problem is, many companies find it tricky to keep their unstructured data secure … [Read more...]

The Threat of Unstructured Data

It’s true to say that the modern-day business is reliant on data. Organizations are constantly looking for ways to leverage data intelligence to improve marketing activities, sales and operations. But with this reliance comes a cost; the uncontrollable rise of unstructured data. What is Unstructured Data and Why Does It Pose a Problem? As an organization that deals with this every day, we … [Read more...]

Why you Need to Audit Privileged Accounts in Active Directory

A report by Forrester once claimed that 80% of all security breaches involved the abuse or misuse of privileged credentials. Let’s accept for a moment that Forrester are right, and that privileged user accounts are the common denominator in a large percentage of security breaches. Knowing this, we’d expect to see all organisations well on the path to having clear processes, policy and controls in … [Read more...]

Most Companies Think Their Active Directory is Secure Until They Talk to Us

We talk to thousands of organisations every week about their Active Directory and, more specifically, how secure and protected their Active Directory is. It’s fair to say, I think there is a good deal of education that needs to be done as to what constitutes a secure Active Directory. Whenever we begin any engagement with any potential client we ask questions around their drivers. One of the … [Read more...]

Poor Visibility and Weak Passwords are Putting Active Directory at Risk

Active Directory is used by approximately 90% of organizations, yet keeping your AD secure still presents a significant challenge due to the large amounts of critical data that it handles. According to a recent security assessment of Active Directory carried out by Skyport Systems, poor visibility and weak passwords are the leading cause of Active Directory security breaches. The problems arise as … [Read more...]