AD Squatter

Are Users “Squatting” in Your Active Directory?

While they’ve been around for decades, in recent years we’ve all been introduced to squatters — people who move into an empty house that isn’t theirs and then take full advantage of the benefits of having a place to stay. They obtain utilities, setup mail delivery, maybe even meet the neighbors — all the while…

Six Degrees of IT Separation

Six Degrees of IT Separation

We are all well aware of the theory that every person is separated from everyone else by only six people. In fact, one 2013 study showed that this separation was just a little over 3.5 people. Although not as widely recognized, there is also a degree of separation between the people in IT who establish…

Temp Security

Temp Employees: A Forgotten Threat

In some ways, there is no greater threat to security than a temp employee. At first glance, the previous statement might not make much sense. After all, the temp has comparatively the least amount of privileges, and they have those privileges for only a short period of time. In reality, however, the accounts created for…

Cloud vs. On-Premises

SharePoint Security: More than just a “cloud vs. on-premises” discussion

Whenever the topic of moving to the cloud comes up, it’s inevitable that the topic of security also arises. And rightly so: the cloud can create a host of security risks concerning who has access to services and data, from both an IT and an end-user perspective. A recent article on SharePoint adoption cited the…

Uncovering Risk

Uncovering the Risk in Your Security

If you were asked, “Is your environment secure?” you’d probably respond with something like “more or less.” After all, we IT professionals are pretty logical, and while we make a solid effort, there are areas of our network environments that are in less-than-desirable shape. You have a lot on your plate, and you just don’t…

IT-Business Collaboration

Managing Groups: IT Shouldn’t Do It Alone

It seems that any tasks that are “tech-related” fall into the hands of IT. It’s been that way as long as I can remember. Managing groups in Active Directory is no different: It is something that IT takes care of — mostly because groups exist within a system (Active Directory) for which most users haven’t…

permissions-certified

The State of Active Directory Groups: Confusion, Chaos, or Control

If you’re like most IT professionals, after a group is created, you never really give that group a second thought. Once you go to the Members tab, add a user or two, and press OK, you don’t look back. It makes sense — it’s just groups, right? I mean, who cares? Perhaps the better question…