How Authentication is Different from Authorization

While authentication and authorization are often used interchangeably, both are considered as separate processes that are used to protect an organization from cyber-attacks. Authentication and authorization are significant parts of the first line of defense against data theft. As data breaches continue to increase in frequency and scale, strong authentication and authorization techniques should be…

ealthcare IT & Cybersecurity Health care

10 Must Do’s for Healthcare IT Admins to Ensure Cyber Security

Healthcare IT & Cybersecurity Health care organizations continually face evolving cyberthreats that can put patient safety at risk. It’s essential to recognize that health cybersecurity is not just an IT issue – it encompasses every level of healthcare, from the CEO to clinicians. So, it’s not simply information – it’s about patient safety. Instead, it’s…

Ransomware Attacks on Active Directory

Active Directory has become a popular pathway for ransomware attacks. Take a deep dive into the exploitation tactics for proactively implementing preventive measures and disrupting threat activity. Active Directory (AD) is an on-prem identity management product that holds a plethora of identity-related information. About 90 percent of Fortune 1000 companies use Active Directory as a…

Active Directory Multi-Factor Authentication

Securely Extending IT with Multi-Factor Authentication

In previous blogs, we’ve stressed the need for IT to go outside of itself and embrace application owners, line-of-business owners, and other stakeholders within your user base. These people generally have better insight into the daily needs and changes related to the applications and resources that they use and can therefore manage the access to…

Empowering External Attacks: The Risk and Threat in Active Directory Groups

According to the 2015 Verizon Data Breach Investigations Report, approximately 85% of data breaches are performed by an external threat actor, with approximately 45% of those breaches focusing on credentials. This makes sense. Without proper credentials, the threat actor won’t be able to access the target data they want. Most threat actors gain entry by…

Unknown User

Active Directory Groups: What You Don’t Know CAN Hurt You!

When’s the last time you actually managed your Active Directory groups? Be honest. We’re not talking about that last time you added someone to a group. We’re talking about the last time you actually did some homework to ensure that the group had the right members, that the permissions were assigned correctly, etc. It’s probably…