Want to pump up your IT security? Strengthen your account management practices
If your company doesn’t get a good handle on its account management practices, your IT security will suffer as a consequence.
If your company doesn’t get a good handle on its account management practices, your IT security will suffer as a consequence.
The FBI has a new director, but it is singing the same old song. The bureau wants an encryption backdoor for devices. Here’s why this is a bad idea.
Even complex passwords don’t cut it anymore — security has to be multidimensional. This is why your business must use two-factor authentication.
Sponsored by Specops Software
The usefulness of periodic password expiration is a hot topic in the cybersecurity world. Read on to learn about its pros and cons, alternative options, and the latest recommendation from NIST.
You bought your phone, you pay the bills, so you get to decide how to use it, right? Not quite. There’s a battle over who controls your smartphone.
Microsoft Modern Keyboard allows you to use Windows Hello’s fingerprint sign-in feature to securely access your Windows devices.
AD FS makes it easy to create and manage the access for user accounts between partners. We have answered all your questions about AD FS here.
Since the last data protection directive (EU) of 1995, the way in which data is processed has evolved drastically. Up until more recently individual’s rights have not been at the forefront of concern when their data is processed and there has been a divide between individual’s rights for protection and the implementation of new technologies. Moreover, the expansion of technology advancements has resulted in data processing becoming more automated. The enforcement of GDPR focuses the protection of individual’s rights and attempts to bridge this divide that has been apparent for some time. One of many parts of the GDPR is the requirement to carry out a Data Protection Impact Assessment (DPIA).
The IoT is happening all around us. One such notable elaboration in this area is drones. Drones, also referred to as unmanned aircraft systems, are quickly finding their way into IoT applications. It is estimated that the drone market may exceed $80billion by 2025. The possibilities for this technology are great however the security concerns (both cybersecurity and physical) must be addressed. Above all, the software utilised must be certified for safety.
This video explains how to identify Active Directory users that have never logged in.