The Real Reason We Need Multiple Data Backups

The Real Reason We Need Multiple Data Backups

In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That’s why multiple data backups are necessary. Ignoring the complexities involved in protecting our data from internal and external attacks, let’s look at the problems associated with successfully storing data (whether structured […]

What is a Port Scanner?

What is a Port Scanner?

Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors: Cyber attackers breached more […]

Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

Despite being an essential piece of the Sysadmin toolbox, Network performance management (NPM) can be a bit of a mystery for many IT professionals. Part of the issue is that the NPM toolset is vast, and can be vague—device monitoring, packet and flow analysis, and log analysis are all part of the equation. Another, is […]

Raspberry Pi Used to Steal 500MB of Data From NASA

Raspberry Pi Used to Steal 500MB of Data From NASA

Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for […]

Using PowerShell to Search and Troubleshoot Windows Event Logs

Using PowerShell to Search and Troubleshoot Windows Event Logs

Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what […]

As The Web Turns 30, The Digital Dark Age is Coming

As The Web Turns 30, The Digital Dark Age is Coming

The World Wide Web’s 30th birthday came and went this week, and though there was much to celebrate—just look how far we’ve gone since the days of America Online CDs and Yahoo! chat rooms— it also seems like the problems the Internet causes are beginning to outweigh the problems it solves. Tim Berners-Lee, who is considered the founder […]

Log Management 101: The Key to Protecting Digital Assets

Log Management 101: The Key to Protecting Digital Assets

Log data can be a tremendous resource for protecting digital assets against cyber attacks. Trouble is, trying to make sense of all the logs generated by IT networks is like pointing a fire hose at someone dying of thirst. They’re desperate for a drink, but they simply can’t handle that much water all at once! […]

Four Ways You Can Strengthen Security with Network Monitoring

Four Ways You Can Strengthen Security with Network Monitoring

For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network devices, systems, and applications, keeping the IT team aware of problems with services, networks, application performance, and more. But despite Network Monitoring’s reputation as an IT […]

How To Use Network Monitoring As An Early Warning System For Security Issues

How To Use Network Monitoring As An Early Warning System For Security Issues

For most IT organizations, the network monitoring tool is an essential, even central part of the IT toolkit. Network monitoring tools play an important role in letting IT pros know where issues exist before helpdesk tickets start coming in, keeping the IT team aware of problems with service, networks, application performance, and more. But despite its reputation […]

Managing User Permissions in Active Directory is the Logical Choice active directory

Managing User Permissions in Active Directory is the Logical Choice

Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are […]