access control

Admins and Privileged Accounts Are The Keys To The Kingdom

The fact is that the people behind the keyboards are your weakest endpoints and the apathy in recognizing that fact is the biggest security threat of organizations today. So, what do we do to address this risk?

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

Grant Access to Workflows, Not to Systems or Data

It happens all the time: Employees, departments or even third-party entities request access to business applications so they can perform important tasks. How much access should they be granted - and to which systems and data. Expert Mike Fitzmaurice sheds some light on enterprise application workflow best practices.

The 5 Best Defenses Against Ransomware Are Aggressive Offenses

The best defense against growing waves of more intelligent ransomware is an aggressive offense. To ensure that your enterprise is ready, consider these five tips offered up to us by Kyle Bubp.

The Perpetual Tug-of-War Between Security and Convenience. What to Do?

Modern enterprise is a perpetual tug-of-war between security and convenience. And the latter is winning. What’s an administrator to do?

Stuck in Cybersecurity Hell? Professional Education Is the Only Way Out

If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.

We Have No Choice. We MUST Make 2017 the Year of Cybersecurity

It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.

Shadow IT & Clouds. Let’s Minimize Risks & Enjoy the Benefits

With adoption of cloud applications on the rise, organizations need a plan for reducing the risk of shadow IT while allowing their organizations to enjoy the cloud's benefits.

Ho, Ho, Ho! PCI DSS Compliance…Just in Time for the Holidays

The Payment Card Industry Security Standards Council has updated its data security standard. PCI DSS 3.2 went into effect November 1, which means many organizations are now scrambling to come into compliance--while also preparing for the busiest time of the year.