Top 10 IT Security Predictions

Ransomware has not gone away Companies invested lots of money to protect from ransomware but still fighting. Simply you need to do a regular backup, track everything and run anti-ransomware protection solutions. IoT – a security time-bomb IoT is a rapidly growing threat and possibly the biggest threat to businesses in the coming years. It’s becoming like … Read more

Top Cloud Security Threats

Be prepare, your IT teams will have to fight with these top Cloud Security Threats in 2018. As more data and applications are moving to the cloud, it has also introduced a lots of new security threats and challenges. Here are the top cloud security issues: Data breaches Data breach is the primary objective of … Read more

2017’S Biggest Data Breaches – A Look Back

A look back in 2017’s where millions of records breached every day. As we see, the Data breach activity was high in throughout 2017, with 1,202 breaches in the 11 months alone, according to a report from the Identity Theft Resource Center. From the WannaCry attacks, Equifax, Deloitte to Uber, it seems like there’s a new … Read more

Things You Should Know About Governance and Management System for GDPR Compliance

GDPR and the Protection of Personal Data include wide range of legal obligations such as: You need to keep documentation for demonstration Clearly define the approach of data protection using risk-based along with roles, responsibilities and accountabilities of data controllers and their processors Compute the risk of processing personal data and ensure the protection of … Read more

Powershell to Find Inactive AD Users and Computers Accounts

In this blog we see how to find disable and inactive Active Directory user and computer accounts and move them to different OU. The LastLogon and LastLogonTimeStamp attributes can help you to decide if an Active Directory user account or computer account is active or inactive. Powershell to find inactive accounts Active Directory for 90 days … Read more