Posts

optimizing the network using Subnets

IP address conservation: Imagine having a network of 20 hosts. A lot of IP addresses (254-20=234) would be lost by using a class C network. It will be more productive to split up large networks into smaller parts and maintain a large digit of addresses. Reduced network traffic: The smaller networks that produce the minimal broadcast domains are established, resulting in less network boundary broadcast traffic. Essentially, a subnet under class A, B, or C is a smaller portion of the network. Creating and using subnets will help keep your network functional and structured. Let's say that a company wants to use four separate IP address blocks, with 50 hosts per segment, for the various segments of its network. The organization utilizes the following blocks of IP addresses: 200.1.0.0 200.1.1.0 200.1.2.0 0 200.1.3.0 Each IP address block will generate 254 IP addresses, allowing the sum of 254 x 4 total IP addresses for network use. That corresponds to 1,016 IP addresses. But on each blo...

Data security trends

The global pandemic reinforced the exceptional value of cloud computing to the world economy. Cloud tools and services enabled organizations to send millions of workers and students home in just a few weeks, thus maintaining supply chains and educational processes. In fact, in 2020, enterprise adoption of cloud services spiked by 50% (McAfee). But this technological shift had its downside: The hasty shift to work from home necessitated prioritizing productivity over security. As a result, it amplified security gaps that had existed before and introduced new security issues — and adversaries are working hard to exploit them. The FBI reports a 300–400% increase in reports of cyberattacks since the start of the pandemic, and McAfee found that external attacks on cloud accounts spiked by 630%. Attackers targeted all types of businesses, but large corporations, governments and critical medical organizations were especially hard hit (MonsterCloud). Ransomware attacks were particularly common...

Certified Threat Intelligence Analyst

Some organizations have the resources and capabilities to secure their IT infrastructure against potential Cyber threats; however, many organizations cannot do so. Organizations either deploy the most up-to-date security software solution or pay thousands of dollars for security tools. Even after that, no organization is entirely secure. Organizations must be aware of modern-day threats and vulnerabilities to keep themselves protected from cyberattacks. These challenges can be overcome by working on a robust cyber threat intelligence program. Certified Threat Intelligence Analyst (C|TIA) training enables cybersecurity professionals to improve their skills in building sufficient organizational cyber threat intelligence. Cyber threat intelligence involves reliable data collection from various sources, context-relevant analysis, production of useful intelligence, and distributing the relevant information to stakeholders. A threat intelligence analyst should have specific skills and knowle...

Limited Filtering of Search Results

To produce rapid, relevant and consistent search results, you need a data classification engine that can ingest the semantic and structural rules of a specific data taxonomy, and then bulk-process large numbers of files by intelligently tagging them with the right metadata according to taxonomic rules. Unfortunately, you can’t achieve either of these tasks with out-of-the-box SharePoint. Native SharePoint search is also limited in its ability to classify content according to criteria that can’t be captured using keywords. For example, knowledge workers and organizational leaders alike often find it necessary and useful to categorize documents based on their level of importance, so a search engine should be able to sort results with the most relevant and important findings at the top of the list. Without additional configuration, SharePoint search lacks the ability to sort results by relevance, even if metadata has been diligently and consistently applied to the whole repository. This i...

Top Things that SysAdmins

Being a sysadmin basically means being a superhero. Fighting bad guys (aka hackers), helping ordinary people (aka users), saving your home (aka IT environment) from various disasters — it all sounds very heroic, but it’s just an average day in a sysadmin’s life. As you can see, dumb users still top the list! Bear in mind, though, that many sysadmins from the SpiceWorks community say that the trick to moving a user along the path from dumb toward wise is proper training. So before complaining about the stupidity of your users, think about ways to educate them. Horrible IT management is still in the top 5, but unrealistic deadlines and printer issues have shot up ahead of that as even bigger pains for sysadmins. During the five years between the surveys, the threat landscape changed dramatically, and as a result, a new contender — hackers, spammers and phishers — rounds out the top 5 tier. The next level of pains includes the pressures of working 24/7 and on a tight budget, as well as sy...

Server-level Roles

As the name implies, server roles allow you to grant server-level permissions. There are two types of server roles: Fixed server roles — SQL Server provides nine fixed server roles; you can assign principals to these roles but you cannot change role permissions. Fixed server roles are convenient and support backwards compatibility, but user-defined roles are recommended wherever possible because they enable you to fine-tune the permissions. Note that SQL Database does not support fixed server roles. However, it includes two roles, dbmanager and loginmanager, that behave like server roles. User-defined server roles — You can assign principals and change role permissions. Creating a user-defined server role is simple: Create the role using this command:CREATE SERVER ROLE serverrole Grant permissions to the role using a command like this example:GRANT ALTER ANY DATABASE TO serverrole Add a principal to the role using this command:ALTER SERVER ROLE serverrole ADD MEMBER [test\exampleuser] ...

Unauthorized External Sharing of Critical Data

Classifying your data will help you understand where your critical data resides, including whether a particular SharePoint Online site or site collection or a OneDrive for Business folder shared with external users contains sensitive data. This insight will enable you to set up external sharing according to the sensitivity and value of data stored there. Who are guest users in Microsoft 365? A guest is any external user who has been granted permission by the owner of a Microsoft 365 group to participate in group conversations, calendar invitations, file sharing and notebook activities. Microsoft 365 guest users are the same as Office 365 guest users. To ensure comprehensive and accurate data discovery and classification, choose an advanced solution like Netwrix Data Classification. Its automated and highly accurate data tagging enables you to choose appropriate sharing settings and also enables users to easily find the data they need. The tagging will also improve the effectiveness of ...