dcsimg

Information Security Trends During a Recession

When discussing information security trends in the event of a recession, the problem is that we are heading into uncharted waters. The number of annual data breaches have been constantly rising since 2005. We are also seeing an increase in the number of data breaches following the housing market crash of 2008, which is what we would expect, as cyber-criminals never let a crisis go to waste. Given … [Read more...]

What COVID-19 Means for Digital Transformation

Let’s face it, 2020 hasn’t got off to a great start. The coronavirus pandemic, which has so far infected more than 550,000 people globally, has forced Governments across the globe to effectively shut down large parts of their economies, with citizens in many countries being required to stay at home. The travel industry has been badly damaged due to the travel restrictions, and … [Read more...]

The Challenge COVID-19 Is Posing to Businesses Worldwide

The spread of Coronavirus and the associated illness, COVID-19, is all anybody is talking about right now – and for good reason. COVID-19 is changing the way enterprises are operating, forcing many employees to work from home in a bid to practice social distancing and limit the spread of the disease. The full effects of the pandemic to businesses and the general public are yet to be realised, with … [Read more...]

What is Identity and Access Management (IAM)?

According to a recent survey, 74% of breaches involved access to a privileged account, and yet many organizations are still failing to take the steps necessary to prevent the abuse of privileged credentials. Ensuring that privileged accounts are secure requires Identity and Access Management (IAM) – a term used to describe the process of managing digital identities and controlling what … [Read more...]

What Condusiv’s Diskeeper Does for Me

I'm a person who uses what he has. For example, my friend Roger purchased a fancy new keyboard, but only uses it on "special occasions" because he wants to keep the hardware in pristine condition. That isn't me--my stuff wears out because I rely on it and use it continuously. To this point, the storage on my Windows 10 workstation computer takes a heavy beating because I read and write data to my … [Read more...]

Improve Performance Without Getting Stuck with Unnecessary and Expensive Hardware

We recently completed a case study with a top construction company who deployed V-locity® I/O reduction software to improve speed on Citrix and SQL applications and avoided unnecessary hardware costs. Performance on Teichert’s Citrix and SQL servers that were running critical applications was beginning to suffer due to the growth of data, increased number of users, and infrastructure … [Read more...]

Overcoming the I/O Blender Effect with V-locity

You’ve decided that you want to try out V-locity® software – kick the tires so to speak.  You’ll just load it on one of your Virtual Machines and see how it goes.  What kind of benefit will you see? It is true that V-locity will likely provide significant benefit on that one VM.  It may even be extraordinary.  But loading V-locity on just one VM on a host … [Read more...]

Why You Should Consider Sharing the Results of Your Security Audit with Your Employees

According to a recent survey by Syncsort, there are inconsistencies relating to how confident companies are about the strength of their cyber-security posture, and how well they actually fare when it comes to protecting their systems and data. 85% of the respondents expressed confidence in their ability to stave off cyber-security threats, while 41% admitted to suffering a security breach. … [Read more...]

How to Require LDAP Signing in Windows Server

The Lightweight Directory Access Protocol (LDAP) is an industry-standard application protocol used by Windows Server Active Directory (AD) to maintain directory services. Client devices and applications authenticate with AD using LDAP ‘bind’ operations. LDAP simple binds send user credentials over the network in cleartext. I.e. there is no encryption of the username and password. While AD supports … [Read more...]

Fine-Grained Password Policy Best Practices

Password and account lockout policies in Active Directory needn’t be all or nothing. In this article, I’ll explain how to set password and account lockout policies for specific groups of users and some best practices you should follow in the process. Active Directory Account Policies Active Directory (AD) domains are configured by default with password and account lockout policies that apply to … [Read more...]