Category: IT Security

IT Security

IT Security in higher education – spotting the attacker

It’s already a given that spotting an attacker is difficult in IT Security – they use compromised credentials to access any and all data available to that account. This means that the attacker is simply accessing whatever data the user was already given access to. So, how are you supposed to spot inappropriate access when

IT Security

usecure appoints Clouds Dubai as usecure distributor in Middle East

usecure Distributor partnership sees security awareness training specialist expanding to the Middle East usecure Ltd, a leading provider of cybersecurity awareness training, has launched its channel partners in the Middle East by appointing Clouds Dubai as usecure distributor. The usecure distributor partnership with Clouds Dubai offers local support for both local partners and customers in

IT Security

Managing access to personal data for GDPR compliance

The European Union is touting the General Data Protection Regulation (GDPR) as the most important change in data privacy regulation in 20 years. From the 25th May 2018, all businesses that process and control personal data within the EU will need to comply with the GDPR or face massive fines. Non-compliance will either result in

IT Security

Identity Access Management with Ekran

Identity Access Management (IAM) is the necessary element of any reliable security control, allowing companies to know who exactly accessed their sensitive data and when, as well as secure access to information preventing unauthorized sessions. In addition to user activity monitoring, Ekran System features several in-built identity and access management software capabilities in order to

IT Security

Empower your Organization with Mobile workforce Management

Companies worldwide deal with huge volumes of information including customer data, customer billing information and information related to the business of the company itself. Business critical data is generated at almost every organizational endpoint lies with the mobile workforce which continues to stay unprotected against malicious activities such as theft, unauthorized share, copy and transfer

IT Security

Affordable Privileged User Monitoring

Privileged users are an essential part of any IT and business system. Accounts with escalated privileges have access to system configuration, user management and permission management. Typically they have extended access to critical applications, sensitive systems and data. This makes privileged user monitoring very important. Comprehensive privileged user monitoring and audit are critical components of

IT Security

What is Cryptojacking & ways to avoid this attack

Monero, Coinhive, cryptojacking, website script injections to mine cryptocurrency. What’s all the fuss? It’s time someone posted a simple, easy to follow explanation of why everyone is talking about this and why you should also upgrade your security. The short story: online thieves can now steal your money and your information, while also driving up your

IT Security

Overcoming Security Risk in Active Directory SSO

Working in IT is a constant battle to find the perfect balance of security and productivity. This is no better personified than in the need for Active Directory (AD) users to access multiple systems through the use of Single Sign-On (SSO) platforms. SSO solutions eliminate the need for users to remember a unique, complex password

IT Security

Coinhive Injections Are a Real Threat

Coinhive Injections attack can often bypass antivirus detection. Heimdal Security team has been monitoring the Coinhive malware for the past months. The recent information about Coinhive website injections is just the tip of the iceberg. Users are extremely exposed to the threat hitting their computer directly. Thousands of government websites, including the NHS, have been