|
|
Newsletter Issue December 2016 |
NNT Security & Compliance Newsletter |
|
Hi , Welcome to NNT's IT Security and Compliance monthly newsletter, delivering breaking security news, how-to-tips and trends directly to your inbox each month.
|
|
|
|
|
|
|
Educational Moment Recap |
Easily Compare & Contrast Compliance Reports with Gen7 |
|
Just in case you missed our recent Educational Moment on Comparing Compliance Reports, we'd like to provide you with a video recap and the recorded version of the Educational Moment. |
|
Click here to view the Educational Moment
|
|
|
|
|
|
|
|
|
|
Top Tips & Tricks |
Don't Forget to Check out NNT's Top Tips & Tricks |
|
NNT's Top Tips & Tricks section is filled with various how-to tips and tutorials designed to shine a light on features within Change Tracker Gen7 that you may not know we're capable of accomplishing. |
|
Check out the Top Tips & Tricks section |
|
|
|
|
|
|
|
|
|
|
|
Blog Post |
Half of IT Pros Consider Insider Threats More Dangerous than Hackers |
|
A new study released by Dimensional Research has found that nearly half of IT pros are more concerned with threats coming from inside their organizations than from cyber criminals attacking from the outside. |
|
Continue reading this blog post here |
|
|
|
|
|
|
|
|
|
|
|
Article |
Historic Yahoo Data Breach: 1 Billion Accounts Compromised |
|
To add more insult to injury, Yahoo has discovered yet another major cyber attack, with more than 1 billion user accounts said to have been compromised in August 2013, making this the largest data breach in history. |
|
Continue reading this article here |
|
|
|
|
|
|
|
|
|
|
|
Video |
5 Stages of Compliance Audit Grief Recorded Webinar |
|
This webinar series highlights the 5 stages of compliance audit grief often observed during a GRC audit: Denial, Anger, Bargaining, Depression, and lastly, Acceptance... |
|
Watch the recorded webinar here |
|
|
|
|
|
|
|
|
|
|
|
Whitepaper |
Threat Intelligence and File Integrity Monitoring |
|
The visibility of configuration changes provided by traditional 'Tripwire®-style' File Integrity Monitoring may provide a great solution for breach detection and security governance, but in the past, this has come at a price. |
|
Read our latest whitepaper here |
|
|
|
|
|
|
|
|
|
|
|
FAQ's |
Frequently Asked Questions |
|
NNT is always updating our FAQ's page to stay up to date with our customers most frequently asked questions and helpful tips to better navigate our solutions... |
|
Check out our FAQ's section here |
|
|
|
|
|
|
|