How to Find and Block Breached Passwords in Active Directory

Cybercriminals love passwords. They’re simple to guess, easy to steal, and can offer unfettered access to a goldmine of data to hold for ransom or sell to other cybercriminals. For those same reasons, compromised passwords are a constant headache for IT teams, who spend far longer than they’d like helping users reset them and fixing…

The post How to Find and Block Breached Passwords in Active Directory appeared first on Petri IT Knowledgebase.

Continue reading How to Find and Block Breached Passwords in Active Directory

How Immutable Backups Protect Against Ransomware

Ransomware protection is one the most important topics for IT Pros and C-Level technology executives. Learn how immutable backups and immutable storage help to protect your organization against data corruption and loss, malware, viruses, and ransomware – and how to implement them.  This post is sponsored by Object First Veeam 2023 Ransomware trends report – most ransomware targets backups In May…

The post How Immutable Backups Protect Against Ransomware appeared first on Petri IT Knowledgebase.

Continue reading How Immutable Backups Protect Against Ransomware

Securing Enterprise Devices: Embracing Zero Trust Security

The excessive use of digital devices in enterprises and their exposure to various networks have increased the probability of cyber-attacks. Enterprise-owned devices contain confidential data that hackers can easily access if devices are not controlled efficiently, and that can cause damage to the values and reputation of the organizations. Thus, data security is now of…

The post Securing Enterprise Devices: Embracing Zero Trust Security appeared first on Petri IT Knowledgebase.

Continue reading Securing Enterprise Devices: Embracing Zero Trust Security

The Dirty Truth About IT Offboarding Automation

Every system administrator dreams of building the perfect Rube Goldberg machine of IT automation to manage the employee IT lifecycle, end to end, including IT offboarding. A new hire joins the company, HR files a ticket, and BAM! In an instant, all of the birthright accounts, access, and permissions are granted in a glorious cascade…

The post The Dirty Truth About IT Offboarding Automation appeared first on Petri IT Knowledgebase.

Continue reading The Dirty Truth About IT Offboarding Automation

The Ultimate Guide to Web Application Firewalls (WAF)

An often-overlooked element of security is the Web Application Firewall (WAF), especially in cloud computing. In this article, I explain what a WAF does, the different kinds of WAF, and I discuss why you should deploy one or more WAFs in your architecture. What is a Web Application Firewall (WAF)? A Web Application Firewall, often…

The post The Ultimate Guide to Web Application Firewalls (WAF) appeared first on Petri IT Knowledgebase.

Continue reading The Ultimate Guide to Web Application Firewalls (WAF)

The Role of Identity Threat and Detection Response in Zero Trust Security

I recently spoke to Sean Deuby, who is Principal Technologist at Semperis and an Identity expert. Sean told me about the importance of protecting identities in the current landscape and how Identity Threat Detection and Response (ITDR) is a critical component of the Zero Trust security model. The emergence of cloud computing and the shift…

The post The Role of Identity Threat and Detection Response in Zero Trust Security appeared first on Petri IT Knowledgebase.

Continue reading The Role of Identity Threat and Detection Response in Zero Trust Security