Change and Configuration Management CONFIGURATION MANAGEMENT INTELLIGENT CHANGE CONTROL

Change & Configuration Management Blog

Read the latest news, developments and opinion pieces on configuration management from industry experts New Net Technologies.

Click on a link below to find out how a layered security approach can improve and speed up your configuration management and protect your files from unauthorized access and changes.

Researchers at Netspoke have found that cloud applications provide ransomware with a means to spread encryption to secondary users without ever downloading the malware again.

The United States Internal Revenue Service announced Tuesday, February 9 that they have been hacked, again.

Pro security zone

Read New Net Technologies CTO Mark Kedgley’s latest article online at Pro Security Zone.

Making a distinction between external and internal threats is becoming increasingly difficult and less and less relevant. The issue of internal security threats was highlighted by Geoff Webb's article this week .

Security threat

As such, when users are ‘over privileged’ in terms of rights and permissions there is an even greater danger that they will be empowered to do far more damage to an organization if they fall victim to such a phishing attack or other malware infection.

Share this blog post

Products
USA Offices
New Net Technologies Ltd
Naples
9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
NNT Logo
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
Redbourn,
St Albans

Herts
AL3 7PR

Tel: 08456 585 005
Fax: 08456 122 031
email info@newnettechnologies.com
Connect with NNT
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Sign up to NNT's IT security and compliance monthly newsletter. Get breaking security news, how-to tips, trends and commentary direct to your inbox.

Sign up to the NNT newsletter