IT Security and Compliance Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
- Category: Change & Configuration Management
With just a few weeks left of National Cyber Security Awareness month, this is a great time for organizations of all sizes to take a good look at their security posture and consider what can be done to strengthen your IT environment.
- Category: Breach Detection
This year is predicted to break records in terms of investment in cyber-security measures, with organizations predicted to allocate nearly nine percent of their entire IT budget to security.
- Category: Breach Detection
The threat posed by cyber criminals seems to be growing larger and more sophisticated by the year and so does the spending on information security related products and services.
- Category: Breach Detection
The Ponemon Institute recently published its 2016 Cost of Data Breach Study: Global Analysis, delving into the average costs of a breach by region, industry, and reason for being breached.
- Category: File Integrity Monitoring
In order to maintain the integrity of a Windows file system, monitoring is applied to ensure no unauthorized changes are made to files, folders or configuration settings.
- Category: Breach Detection
Cybercrime has been found to be the leading cause of data breaches within the healthcare industry for the second year in a row, according to the Ponemon Institutes’ Six Annual Benchmark Study on Privacy & Security on Healthcare Data.
- Category: Ransomware
The United States and Canadian governments have joined forces and issued a joint PSA about ransomware infections and what can be done to stop them.
- Category: HIPAA HITECH
While the digital health industry was intended to make health records more accessible for doctors and patients, it seems to be doing more harm than good.
- Category: NIST 800-53
NNT review and discuss the range of Cyber Security Threats predicted by analysts and vendors and present a Top Ten of Cyber Security Safety Measures. Drinking kale and beetroot smoothies isn’t one of them, but to find out why not, and to see what did make the list, read on…
- Category: File Integrity Monitoring
It should come as no surprise that the financial industry is the ideal target for lawless cyber thieves, holding a treasure trove of sensitive information and financial credentials of innocent victims.
- Disable Windows Services
- What are the recommended Audit Policy settings for Windows & Linux
- Server Hardening Policy - Examples and Tips
- Server Hardening Checklist - Which Configuration Hardening Checklist Will Make My Server Most Secure?
- File Integrity Monitoring Software
- Windows Server 2008 2008R2 Hardening Guide
- Linux Server Hardening
- The Windows Advanced Audit Policy Configuration
- The Top Ten of Audit and Event Log Monitoring
- Which File Integrity Monitoring Technology Is Best For FIM? File Integrity Monitoring FIM or SIEM FIM?