Block Hackers from Guessing Passwords with MDaemon’s Improved Dynamic Screening
If you have an email account (and in 2017, you probably have more than one), you are a target. More specifically, your email password is a target and a coveted prize for hackers. And let’s face it –...
View Article5 things you need to audit for GDPR in Active Directory
The General Data Protection Regulation (GDPR) will take full effect as of May, 2018. Make sure you’re ready for it. Here are 5 things to audit in Active Directory for GDPR Check out Orthology’s...
View ArticleBasic Principles for Securing Active Directory
Many organizations rely on Active Directory for centralized control over their resources. However, in our experience, a vast majority of these companies rely only the in-built security settings of...
View ArticleGFI Software strengthens email security for SMBs with the launch of GFI...
GFI Software, the leading provider of security and communication solutions unveiled today new antivirus (AV) engines Cyren and Sophos for GFI MailEssentials v. 21, the award-winning email security...
View ArticleBest Practices for Keeping Active Directory Clean
With Active Directory being such an important part of your IT security, can you really afford to leave it in a dirty state any longer? It happens in many organizations; over time your Active Directory...
View ArticleMind these digital crimes and arm yourself against them
Have you noticed that, in this year alone, headlines are inundated with words that contain “cyber”? Cybercrime. Cyberattack. Cybersecurity. Cyberwarfare. The cyber. (Okay, that was last year.) Frankly,...
View ArticleMalwarebytes tracking missed detections in traditional anti-virus
Tracking real-world scans on systems over the first six months of 2017, Malwarebytes says that typical desktop anti-virus solutions aren’t cutting it. The company examined detection data from nearly 10...
View Article5 key changes introduced by the GDPR
There are just over six months to go until the General Data Protection Regulation (GDPR) is enforced. The GDPR will have a significant impact on organisational data protection regimes around the world....
View ArticleTurbo.net Containers in Parallels RAS
Parallels Remote Application Server is a comprehensive virtual application and desktop delivery solution that allows your employees to access and use applications and data from any device. By...
View ArticleThe State of Ransomware among SMBs
The following report, conducted by Osterman Research and sponsored by Malwarebytes, presents the findings on ransomware and other critical security issues from more than 1,000 small and medium-sized...
View ArticleStay ahead of the hackers with affordable penetration testing!
Most organisations are the target of random, indiscriminate attacks, and they need an appropriate level of penetration testing to ensure their defences are adequate. Instead of automatically generated...
View ArticleThe first steps towards GDPR compliance
The EU GDPR, due to come into effect in May 2018, creates new obligations for businesses that process EU residents’ personal data and allows authorities to impose fines of up to 4% of annual global...
View ArticleHow to ensure File Server data access governance in 6 easy steps
Seems nowadays that there’s a new data breach every day in the mainstream news. The sheer volume of highly publicized data security breaches serve as an important reminder that data access governance...
View ArticleCan you meet these areas of technical compliance set out in our short survey?
Are you ready for GDPR? Take all the necessary tests to find out if you can meet technical compliance! Do the test here Check out Orthology’s solutions for GDPR Compliance here
View ArticleSee how LepideAuditor helps finance organizations pass compliance and...
According to the Verizon 2017 payment security report, nearly half (44.6%) of companies failed to protect payment card data on an ongoing basis; leading to PCI compliance failure. Other significant...
View ArticleThe state of ransomware among SMBs
This report, conducted by Osterman Research and sponsored by Malwarebytes, presents the findings on ransomware and other critical security issues from more than 1,000 small and medium-sized...
View ArticleWhy You Need to Audit Privileged Access in Active Directory
If you’re not tracking permissions and the access your privileged users have to servers and data, you could be in danger of being taken advantage of. A recent report, published in Data Breach Digest by...
View ArticleNine ways to Prevent Ex-employees from Compromising IT security
No one needs to be reminded of the almost daily, high profile media reports of security breaches and their devastating effects. However, little is said about the underlying threat of ex-employees....
View ArticleCyberattacks on Businesses Increased 23 Percent as ‘New Mafia’ Hits the...
Malwarebytes™, the leading advanced malware prevention and remediation solution, today unveiled a report on the new age of organized cybercrime. It describes how this ‘New Mafia’ is accelerating the...
View ArticleWhy risk assessments are crucial for ISO 27001 compliance
Experts often say that risk assessments are the most important part of an organisation’s ISO 27001 compliance project, but why is this? ISO 27001 risk assessments are designed to provide an accurate...
View Article
More Pages to Explore .....