Dealing with data glut: Why ROT data is an issue, and how to manage it

“Unstructured data accounts for as much as 80 percent of an organization’s data footprint.” – Gartner

As file storage grows rapidly year after year, new challenges arise around keeping data safe and maintaining control over data storage systems.

Who owns …

DataSecurity Plus 3 min read Read

Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds

A critical Active Directory vulnerability (CVE-2020-1472)   has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers and domain controllers in an organization.

 This high-risk vulnerability, dubbed Zerologon, gives threat actors …

Log360 4 min read Read

Automate employee life cycle management with the ADManager Plus-Ultipro integration

Enterprise employee management is inherently challenging. On average, an IT administrator spends several hours to create user identities in Active Directory (AD) and grant role-based access to relevant business applications. Profile updates that reflect address and role changes, including employee …

Active Directory 2 min read Read

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures …

Log360 2 min read Read

How to stop rampant, poor password practices

We’ve all heard about the consequences of poor password practices again and again. Yet, users still reuse their passwords for multiple accounts, create weak passwords, or use dictionary words and compromised passwords. Why do users still follow these poor …

ADSelfService Plus 2 min read Read

How to ensure a seamless end-user experience: The ITOM Podcast [Episode 6]

 

ITOM Podcast Episode 6

The ITOM Podcast is back with an all new episode aimed to alleviate all your remote work woes in your IT environment. In the last episode, we discussed in detail about the need for compliance checks, major causes of …

General 2 min read Read

Why following NIST guidelines will strengthen your SIEM framework

The National Institute of Standards and Technology (NIST) is a federal, non-regulatory agency funded by the United States Department of Commerce. It aims to provide security guidelines, quality standards, and more for various industries. NIST publishes a cybersecurity framework that …

Log360 2 min read Read

How to ensure network compliance in this era of remote work: The ITOM Podcast [Episode 5]

ITOM podcast Episode 5

The ITOM Podcast returns with yet another episode to help you eliminate all the remote work woes in your IT environment. In the last episode, we discussed in detail about the key areas enterprises need to monitor to ensure endpoint …

General 2 min read Read

How to defend your IT assets while implementing BYOD policies: The ITOM Podcast [Episode 4]

ITOM Podcast episode 4

Gear up! The ITOM Podcast is back with an all new episode intended to help you surmount all your remote work challenges in an IT environment. In the last episode, we discussed VPN monitoring in detail, the challenges encountered …

General 2 min read Read