Blog

Data Access Governance Best Practices - Part 2 of 2

File Server Permissions

  • 7 July 2021
  • Number of views: 1534
Data Access Governance Best Practices - Part 2 of 2

As mentioned in Part 1, mounting a good defense requires understanding the offense and therefore requires getting control of your file permissions. This is a very important and often overlooked step.  It includes define, assign and organize both users and administrative level permissions as well system access level permissions. 

Data Access Governance Best Practices - Part 1 of 2

Data Access Management

  • 15 April 2021
  • Number of views: 1137
Data Access Governance Best Practices - Part 1 of 2

Mounting a good defense requires understanding the offense. When it comes to data access, file permissions and systems and network configurations, it consists of the following: 
 

  1.  Common Sense and Concern
  2.  Hard Work (just doing it)
  3.  Knowledge (basic and advanced)
  4.  Consistent Review

Regardless, everyone should be engaged and concerned, and it really does take everyone. Note: Most security problems and issues start with the network and inside the network with local network users (employees and management - in other words, you).  

Best Practices for Windows File Server Auditing

Top 8 For Starters

  • 18 December 2020
  • Number of views: 1557

Auditing your Microsoft Windows file is a one of the best ways to monitor your company’s file servers. You will find out who is accessing what files, creating new files, deleting files, copying files, and moving files. To fully take advantage of Windows file server auditing, you must define your policies and use best practices.

Malwarebytes Browser Extension - Why should you consider using it?

Malwarebytes Browser Extension

  • 1 July 2020
  • Number of views: 1888
Malwarebytes Browser Extension - Why should you consider using it?

Malwarebytes Browser Extension delivers a safer and faster web browsing experience. It blocks malicious websites and filters out unwanted content (resulting in up to three times faster webpage load times). The filtering is not based on definitions, so the extensions can block previously-unidentified fake tech support scams and their tactics.

What will it do for your browsing experience? It prevents pop-ups, browser hijackers, and browser lockers from harassing you and interrupting your surfing. It also blocks clickbait links and fake news content, stops in-browser cryptocurrency miners, and gives other malicious content the boot. All this while relying on threat behavior patterns rather than on researchers who have to track down, identify the malware, and add it to a database of known threats. (We still need those researchers to make our products better. This is just a different, faster method.)

RSS
«March 2024»
MonTueWedThuFriSatSun
26272829123
45678910
11121314151617
18192021222324
25262728293031
1234567