4 Ways Cyberattackers Take Advantage of Mismanaged Permissions

If we’ve learned nothing else about cybercriminal organizations over the last few years, we know for certain these folks are experts on Microsoft security. They’re no longer simply opportunistically gaining access to your network; instead, they’re leveraging known vulnerabilities in operating systems and applications and using the very network they’ve compromised to assist them in finding their intended target … Read more 4 Ways Cyberattackers Take Advantage of Mismanaged Permissions

Top 6 Active Directory Security Groups Best Practices in 2020

Active Directory is essentially a registry containing all the information about a network, including users, groups, computers and printers, and servers. Each of these things, whether physical or virtual, is considered an “object” in Active Directory, and has various attributes assigned to it, such as a name, number, or group membership. Active Directory is used … Read more Top 6 Active Directory Security Groups Best Practices in 2020

RBAC vs. ABAC: What’s the Difference?

In any company, network users must be both authenticated and authorized before they can access parts of the system capable of leading to security breaches. The process of gaining authorization is called access control. In this guide, I discuss the two main methods for managing access control for your systems—role-based access control (RBAC) and attribute-based … Read more RBAC vs. ABAC: What’s the Difference?

3 Ways Your Permissions Are in Worse Shape Than You Think

IT is really busy these days. In fact, IT’s been busy for as long as you can remember. Security issues today alone could keep you busy full-time, but there’s just not enough time in the day. Strategic initiatives and fires seem to take precedent daily, pushing some of the more necessary, but rudimentary, parts of … Read more 3 Ways Your Permissions Are in Worse Shape Than You Think

What Is Threat Intelligence? Definition and Types

Since almost everything we own is connected to the internet, it’s time to take another look at cybersecurity. The nature of cybersecurity threats has changed since the early years of the web: cybercriminals are getting more sophisticated and less obvious. According to the Verizon Data Breach Investigations Report, in 2018, 74% of data breaches were … Read more What Is Threat Intelligence? Definition and Types

8 Best HIDS Tools—Host-Based Intrusion Detection Systems

Even when we have the best of intentions and work hard to keep our systems protected, human beings are fallible. Hackers know this, which can lead to the creation of elaborate and convincing ploys used to trick your end users into divulging credentials, allowing hackers access to your systems. For this reason, it’s essential for … Read more 8 Best HIDS Tools—Host-Based Intrusion Detection Systems

What Is an Intrusion Detection System? Latest Types and Tools

Keeping your network safe from intrusion is one of the most vital parts of system and network administration and security. If your network is penetrated by a malicious attacker, it can lead to massive losses for your company, including potential downtime, data breaches, and loss of customer trust. An intrusion detection system (IDS) is a … Read more What Is an Intrusion Detection System? Latest Types and Tools

2020 Best Software Updater

It can be hard to keep on top of all the software on your computer, especially if every time you open a program it tells you it needs updating. Luckily, you can install a software updater to manage this process for you. The importance of software updaters is twofold: first, they make sure you’re using … Read more 2020 Best Software Updater

SQL Server Security Best Practices for 2020

Whether you’re running an instance of open-source MySQL or Microsoft SQL Server, you need to be certain you have robust, high-quality security measures in place. This is extremely important for preventing malicious access to your database, particularly if sensitive or personal data is stored on your servers. In this article, I cover the essential SQL … Read more SQL Server Security Best Practices for 2020