IT Security and Compliance Articles

Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.


The interesting thing about the breach reported by Vancouver-based Information Systems & Supplies Inc. is that it highlights the responsibility now borne by 3rd party suppliers to PCI merchants. Remote access services such as LogMeIn or TeamViewer provide superb levels of functionality equivalent to a direct Remote Desktop session, and, naturally, are highly secure in their architecture and operation.

Windows Advanced Audit Policy Screenshot

Since the introduction of the Windows Advanced Audit Policy, fine-grain control has been provided to system activity auditing. This allows detailed auditing to be applied more precisely with unwanted events being suppressed at source. The audit policy settings work in conjunction with a 'System Access Control List' (SACL). The SACL is defined for each system object (e.g. folder, file etc) and defines the access attempts to be logged.

Security Is Compromised Without File Integrity Monitoring

This final article in the series of 3 focuses on one of the key security best practices that is usually the hardest to implement, one requiring wholesale organizational and cultural change within the IT Team: Change Management.

Security Is Compromised Without File Integrity Monitoring

In part 1 of this series of articles, we talked about the importance of using File Integrity monitoring for system files as a backstop to AV for detecting malware. Enterprise-level FIM goes further where configuration files are concerned to not only detect and report changes to config settings but to also identify vulnerabilities.

Security lock

This is a 3 step series examining why File Integrity Monitoring (FIM) is essential for the security of any business’ IT. This first section examines the need for malware detection, addressing the inevitable flaws in anti-virus systems using host intrusion detection system (HIDS) principles.

File Integrity Monitoring FIM or SIEM FIM

Within the FIM technology market, there are choices to be made. Agent-based or agentless is the most common choice, but even then there are both SIEM and ‘pure-play’ FIM, solutions to choose between.

SIEM Solution

Whether you are working from a SANS 20 Security Best Practices approach or working with an auditor for SOX compliance or QSA for PCI compliance, you will be implementing a logging solution.

PCI Compliance projec

Most organizations will turn to a QSA when undertaking a PCI Compliance project. A Qualified Security Assessor is the guy you need to satisfy with any security measures and procedures you implement to meet compliance with the PCI DSS so it makes sense to get them to tell you what you need to do.

System Hardening and FIM

In the UK, HM Government’s ‘Cyber Incident Response Scheme’ is closely aligned with intent and purpose to the forthcoming US Cyber Threat Sharing Bill.

PCI DSS Version 3

PCI DSS Version 3 will soon be with us. Such is the anticipation that the PCI Security Standards Council have released a sneak preview ‘Change Highlights’ document.

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2023, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.