Securing File Servers: All You Need to Know
What does the war against data breaches have to do with security of file servers? Well, almost everything. Whole lot of companies have been using file servers to store all kinds of information,...
View ArticleSysAdmin Appreciation Day 2015: Power2ITGuyz Contest
Today we launch a worldwide contest for system administrators to honor IT Pros and give out some prizes – SysAdmin Appreciation Day is soon to be upon us. So join us in celebration by supporting the...
View ArticleSystem Administrators Blowing Off Steam in a Celebratory Contest
The role of system administrators is often unjustly underestimated, people only think of them when something is on fire – hopefully, just metaphorically, but who knows. Understanding, that your...
View ArticleHow Should IT Handle User Termination
Employment termination, as well as taking aboard the new hires, is an ongoing process for every organization. People get fired, quit/resign, replacements are found – it’s a never-ending story. IT...
View ArticleTop 7 IT Security Threats for 2016
While the number of announced data breaches in 2015 is lower compared to 2014, the number of compromised accounts increased dramatically, exposing more personal data than ever before. Among the top...
View Article5 Jedi IT Security Tenets To Defend Against Data Breaches
Star Wars is not just a cultural phenomenon, it is a story that can be interpreted in many ways, even as a data breach case. The everlasting battle between hackers and IT pros very much resembles the...
View Article2015 Cloud Security Survey: Security Concerns about Migration to the Cloud
Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, released the results of its global 2015 Cloud Security Survey...
View ArticleTop 10 IT Security Conferences in 2016
One of the best ways for those interested in IT leadership in security to advance their professional skills is to attend world-class conferences. I have put together a list of US IT Security...
View ArticleHow to Detect Who Disabled a User Account in Active Directory
Users whose accounts have been disabled, either accidentally or maliciously, are unable to log into IT systems using Windows authentication. Those who are already logged in might experience problems...
View Article
More Pages to Explore .....