Least privilege access is a crucial part of security that protects against overprovisioning user permissions. Even with IT technicians, and junior administrators, this needs to be considered when configuring permissions in the environment. A case in point is helpdesk... Read More
Password Policy Management
What is Active Directory? A brief overview…
Active Directory, commonly referred to as AD (not to be confused with Entra ID, formerly Azure AD) was developed by Microsoft and first released as a centralized domain directory service with Windows 2000 Server Edition. Since its original release,... Read More
SSO vs Enterprise Password Manager: Which is better for reducing your password risk?
Organizations looking to reduce the burden of passwords on their users often consider Single Sign On (SSO) vendors or deploying an enterprise password manager. Each has their advantages, so which one is best for an organization to choose? Single-sign... Read More
CISA Shields Up: How to prepare for the Russia-Ukraine cybersecurity hazard
CISA issues ‘Shields Up’ alert to warn US companies about potential Russian hacking attempts to disrupt essential services and critical infrastructure as the Russia-Ukraine crisis escalates. Get ahead of the situation with essential information. You may have seen the... Read More
UK’s National Crime Agency discovers 585 million compromised passwords in cloud storage facility
Today, Specops Software announced the addition of over 230 million compromised passwords to its Breached Password Protection database. This latest update comes from both its own internal attack monitoring systems as well as the addition of hundreds of millions... Read More
Securing ADFS against password spraying attacks
Stolen account passwords provide the “path of least resistance” into a victim network for an attacker. Once compromised credentials are obtained, the attacker can easily access business-critical systems with little effort. Active Directory Federation Service (ADFS) is a solution... Read More
CIS Benchmark Password Policy
With technology constantly evolving, cybersecurity organizations are helping people, businesses, and governments with best practices to protect themselves against emerging threats. The Center for Internet Security (CIS) is one of these advisement groups. The CIS Controls and CIS Benchmarks provide globally recognized best practices for security IT systems and... Read More
Protecting Your Organization Against the Nobelium Attacks
The UK’s National Cyber Security Centre has recently issued guidance to organizations in response to a series of attacks. This guidance was released following a notification in which Microsoft indicated that it had identified new activity tied to an... Read More
Top 5 Hacker Groups and their Attacks
One of the frightening cybersecurity risks for businesses today is undoubtedly ransomware. It doesn’t discriminate and leaves in its wake encrypted, unreadable files, threats of data leaks, and often millions of dollars in damages. Moreover, large-scale and sophisticated ransomware... Read More
What metrics should sysadmins use to show improvement over time?
To illustrate how essential IT systems are to the proper functioning of the business, system administrators should use a number of metrics to communicate key KPIs with non-technical leadership. This can help justify the overall budget of the IT department, as well as the... Read More