/Peter Thomas

About Peter Thomas

This author has not yet filled in any details.
So far has created 17 blog entries.

Mitigating Ransomware in Healthcare

Why Ransomware is common in the healthcare industry?

Healthcare organizations are often targeted by cyberattacks because they have a large amount of high value information that can be stolen or used for malicious purposes. This information includes patient medical records, financial data, and personal identification information, as well as intellectual property related to medical research. These […]

By |January 25th, 2023|Blog|0 Comments

Auditing Privileged Access Management

What is Privileged Access Management?

Privileged Access Management (PAM) is a security practice designed to secure and manage the access rights of users who have elevated privileges within an organization. These privileges, often referred to as “privileged accounts,” allow users to perform tasks that are restricted to a small group of trusted individuals, such as accessing […]

By |January 3rd, 2023|Blog|0 Comments

Insider Threat Mitigation During Tough Economic Cycles

The global economy is currently facing a potential recession, with many analysts and experts predicting a downturn in the near future. During a recession, companies may face financial pressures and may be forced to cut costs, which can lead to a reduction in resources for cybersecurity. This can make it more difficult for companies to […]

By |December 19th, 2022|Blog|0 Comments

How to Reduce Ransomware Risk by Assessing Inactive Accounts & Privileged Groups

Inactive accounts are active accounts that have not been used for an extended period (dormant) or have never been used, while privileged groups contain accounts with high privileges. Examples of privileged groups are Domain Admins, Enterprise Admins, Schema Admins, Built-in Administrators, and others. Both categories of accounts are high value targets for hackers who access […]

By |September 1st, 2022|Blog|Comments Off on How to Reduce Ransomware Risk by Assessing Inactive Accounts & Privileged Groups

How to Audit Ransomware Risk

The protection of data and information assets is a key, ongoing focus for organizations around the world. Using encryption technology, limitations to access, and various high-level efforts, as quickly as organizations put a security practice in place, bad actors are evolving in their pressure tactics to infiltrate the system. Ransomware is an evolving tool of […]

By |August 22nd, 2022|Blog|Comments Off on How to Audit Ransomware Risk

How to Investigate Ransomware Risk

Knowing how to investigate ransomware risk is absolutely critical to maintaining a safe online presence in today’s fast-paced world. With unprecedented numbers of people conducting business online, there is a parallel and unfortunate trend showing a substantial increase in malicious activity. From cyberattacks to malware, organizations must be able to assess any security vulnerability before […]

By |July 25th, 2022|Blog|Comments Off on How to Investigate Ransomware Risk

How to Assess Ransomware Risk with LT Auditor+

Ransomware attacks continue to increase every day. Cyber threats are hitting more businesses in the United States and worldwide. According to 2022 – Verizon Data Breach Investigation Report- “this year Ransomware has continued its upward trend with an almost 13% increase–a rise as big as the last five years combined (for a total of 25% […]

By |June 16th, 2022|Blog|0 Comments

Monitoring Windows/AD Authentications and Logon Activity

Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which are all part of the Windows security architecture.

LT Auditor+ 2013 is able to completely audit all activity associated with Kerberos […]

By |January 14th, 2016|Blog|0 Comments

Inactive Active Directory User Accounts

Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network.  Most security policies and compliance regulations also mandate that Active Directory user accounts be disabled after a certain period of inactivity. […]

By |January 14th, 2016|Blog|0 Comments

Auditing and Monitoring Active Directory Group Policies

Group Policy is a core component of Active Directory (AD) used to centrally manage an organizations’ security, application, and user settings. Group Policy settings are divided into user and computer sections, and a policy can be configured to be applied based on whether the target is a user or computer object.

An extensive range of functionality […]

By |January 14th, 2016|Blog|0 Comments