File Integrity Monitoring Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
The ways in which File Integrity Monitoring can strengthen your security are threefold – through system hardening, malware protection, and change management. Click on a link below to find out more about how firewalls, servers, databases, servers and anti-virus programs can protect your IT systems.
The UK’s new National Cyber Security Strategy was announced on Tuesday by Chancellor Philip Hammond, a £1.9 billion investment plan over the next five years with the goal of making the UK the safest place to do business.
With the exception of Role-Based Access Control (RBAC), File Integrity Monitoring (FIM) is the only PCI requirement that achieves security in its purest form; prevention of, or alerts on, deviation from a known-good baseline.
Pokémon Go, the new GPS-based augmented reality OS and Android mobile gaming app, has been causing a riff amongst the cyber community, leaving many concerned about the privacy risks and cyber threats associated with this new application.
The United States and Canadian governments have joined forces and issued a joint PSA about ransomware infections and what can be done to stop them.
It should come as no surprise that the financial industry is the ideal target for lawless cyber thieves, holding a treasure trove of sensitive information and financial credentials of innocent victims.
Our threat landscape continues to expand and cyber criminals have discovered that the encryption of data followed by a ransom fee can be a highly lucrative business. While many companies recognize the serious threat posed by ransomware, many still continue to go conduct business without a multi-layered security solution in place to ward off malicious attacks.
In order to maintain the integrity of a Windows file system, monitoring is applied to ensure no unauthorized changes are made to files, folders or configuration settings.
We were recently asked to contribute to an article being written about "Fraud healthchecks, and training: what should businesses be doing?"
The scope included all fraud, so not just IT fraud, but data theft by employees, material theft, and financial fraud.
Our stance is that all fraud is preventable, but in the same way that any football game is winnable – stuff happens, mistakes are made, freak goals are scored.
Accepting this means that, while the goal for combatting fraud is 100%, the reality will be that you cant win 'em all.
This is a 3 step series examining why File Integrity Monitoring (FIM) is essential for the security of any business’ IT. This first section examines the need for malware detection, addressing the inevitable flaws in anti-virus systems using host intrusion detection system (HIDS) principles.
In part 1 of this series of articles we talked about the importance of using File Integrity monitoring for system files as a backstop to AV for detecting malware. Enterprise-level FIM goes further where configuration files are concerned to not only detect and report changes to config settings, but to also identify vulnerabilities.