Everyone has been talking about Pokémon Go, the new app featuring the augmented reality game. But the hype is more than just talk:
Nintendo stock nearly doubled from the popularity of the app (though it later […]
For as long as the internet has been a primary mode of doing business, cyber criminals have used phishing scams to steal money and information from consumers and businesses. But recently, cyber thieves have innovated […]
Cybersecurity threats happen – and often. It’s gotten to the point that we can read a story every day about shady characters hacking into company information.
In fact, it’s been reported that LinkedIn is a recent […]
This is the first of a two-year term in which I’ll serve as the Chairman of the Board for the Center for Houston’s Future (CHF), a think tank of diverse business and civic leaders working […]
We hear about hackers breaking into company networks nearly every day. They damage, steal, and release sensitive data. They put our companies and customers at risk. If you’re a business leader or IT professional, it’s important […]
Microsoft Windows operating systems uses a variety of authentication technologies that allow users access to resources on the network. These authentication protocols include Kerberos, NT LAN Manager (NTLM), Negotiate, Schannel (secure channel) and Digest which […]
Active Directory (AD) users’ IDs that have not been used for extended periods of time pose a threat to any organization, as these IDs could be used to gain illegal access to the network. Most […]
Group Policy is a core component of Active Directory (AD) used to centrally manage an organizations’ security, application, and user settings. Group Policy settings are divided into user and computer sections, and a policy can […]
Access to files and folders is controlled by permissions or Discretionary Access Control Lists (DACLs) assigned to folders and files. In an Active Directory (AD) environment, user access to file and folder resources is governed […]
Why Audit High-Volume Copy Operations?
One of the most common methods to extract or steal information is to copy large volumes of critical information from file shares to either flash drives or other USB devices that […]