Disgruntled IT Contractor in Jail | Protect Against Insider Threats

Large-scale internal security breaches are becoming increasingly more popular, costing companies millions of dollars each year. The sum of this loss comes from the financial damages of the breach itself and, in some cases more importantly, damage to the company’s reputation, translating to big dollars off the company’s bottom line. A recent judgement serves as […]

The #1 Way to Prevent Insider Threats

Data Breaches Happen Data security is nothing new. Where there is sensitive information, there are those who seek to access, steal, and misuse it. The unfortunate truth about malicious activities is that a third of all data breaches are perpetrated by someone from inside the company… and that number is growing. Businesses in the united […]

Security Budgets During COVID-19 – A New Infographic

When lockdown protocols kicked in due to COVID-19’s rapid spread all around the world, teams across many industries migrated to a work-from-home normal. However, with remote work comes new security risks—like employees accessing sensitive company assets through personal devices and home wifi. How have security budgets changed as a result of new and broadening security […]

What’s the difference between Microsoft user-based MFA and Azure MFA?

  If your business relies on cloud computing services, it’s essential that you set security defaults that include multi–factor authentication (MFA) to protect your resources. Protecting your user accounts during a sign in event is vital for securing accounts that require privileged access to data and other resources in the cloud. MFA has become the standard in electronic […]

Bridging the Office 365 Insider Threat Security Gap

While Microsoft Office 365 maintains robust  security features, it may not offer the granularity that many enterprises need. When Microsoft Office 365 isn’t maintained and configured properly, it can put  security and compliance requirements in doubt. Here’s what you need to know about the  security features  included in  Office 365 Enterprise, and what companies should […]

We are the enemy | A Look at Insider Threats

  Every company needs to be aware of insider threats. The source of insider threats are employees or administrators that make mistakes or purposefully damage your organization’s IT Systems. Insider threats are pervasive and difficult to defend against, and they require proactive security measures and extensive training to defeat. A company’s worst enemies can be its employees—whether […]

FBI charges former AWS engineer in Capital One breach

The FBI arrested a former AWS engineer who allegedly stole data for more than 100 million Capital One customers and credit card applications, thanks to a misconfigured firewall. The FBI arrested and charged a former AWS engineer Monday in connection with a massive data breach at Capital One. Paige A. Thompson, 33, is accused of […]

Is your Active Directory security relying on a single check-box?

Don’t trust your Active Directory Security to a single check-box! Trusting the disable check box in Active Directory is risky if additional steps are not taken to ensure the the user account will not be re-enabled with unintended (possibly disastrous) consequences. Often the best practice steps are overlooked or not followed because of the additional […]