Change Tracker Gen 7

IT Security and Compliance White Papers

Read the latest white papers from industry experts New Net Technologies. We provide comprehensive information on IT security and compliance.

Right now, Ransomware is the Great White Shark of cyber attacks, the most feared malware of all, and both corporate and home users are running scared. And rightly so - Anyone who has had experience with Ransomware, will attest to the agony and disruption. But instead of worrying about an attack, what action can be taken to safely venture back into the water and not necessarily “with a bigger Boat”?

This whitepaper reviews and discusses the range of Cyber Security Threats predicted by analysts and vendors, including the NNT view on the outlook for 2016 and beyond.

The second part of the paper examines why all organizations continue to be at risk of being breached and presents a Top Ten of Cyber Security Safety Measures to mitigate this sustained threat.

The visibility of configuration changes provided by traditional ‘Tripwire®-style’ file integrity monitoring may provide a great solution for breach detection and security governance, but in the past, this has come at a price.

Changes need to be reviewed and approved and to do this properly has always been a labour-intensive task.

Within any IT estate, the only constant is change.

Change Control has always been a key security best practice. With every change made to IT systems comes a risk of a weakening of security defenses, not to mention operational problems, through misconfigurations. Changes also create ‘noise’ that makes it more difficult to detect a breach when a cyber attack succeeds.

Our medical, health and personal information should remain private. While the principle of Doctor-Patient confidentiality has always been regarded as sacrosanct, the electronic age has inevitably led to greater ease of access to all information, including confidential patient details a.k.a. electronic protected health information.

Vulnerability management is a key security best-practice that serves to prevent the complete spectrum of cyber-attacks. But how do you strike the right balance between maintaining the security of an IT environment that never stands still, and maximizing system performance, uptime and service delivery?

PCI DSS Version 3.2 - This table lists the requirements of the PCI DSS Version 3.2 where NNT Change Tracker (file integrity monitor) and NNT Log Tracker (SIEM log analyzer) can provide a solution. Using NNT solutions alone will satisfy 30% of total PCI compliance requirements, but with typical implementation times of just a few hours.

The Health Information Technology for Economic & Clinical Health (HITECH) act really does ‘up the ante’ for HIPAA enforcement.

This whitepaper is a Guide for IT professionals – an ‘Everything you wanted to know about Compliance’. Anyone with experience of being audited in the past will learn how to remain compliant with your required standards, making the next round of Audits much more straightforward.

All security standards and Corporate Governance Compliance Policies such as PCI DSS, GCSx CoCo, SOX (Sarbanes Oxley), GLBA, NERC CIP, HIPAA, HITECH, ISO27000 and FISMA require IT systems to be secure in order that they protect confidential data.

The breach at Target has not just been big news within the Information Security community; it is worldwide headline news in all mainstream media outlets. This article looks at Brian Krebs’† excellent (as usual) investigation and analysis of the story so far from an NNT perspective.

USA Offices
New Net Technologies Ltd
9128 Strada Place
Naples, Florida, 34108
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
NNT Logo
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
St Albans


Tel: 08456 585 005
Fax: 08456 122 031
Connect with NNT
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Sign up to NNT's IT security and compliance monthly newsletter. Get breaking security news, how-to tips, trends and commentary direct to your inbox.