Browsed by
Category: Data Access Governance

Top Five Ways You End Up With Open Shares: Part 2

Top Five Ways You End Up With Open Shares: Part 2

In the first post of this series, we explored two ways you can end up with dangerous open shares. Open shares are essentially folders that everyone in your company can access. Sharing what is in those folders isn’t a threat by itself, but securing those documents can be tough. In this post, we’ll discuss three equally important, but less common ways to end up with dangerous open shares. Learn more about open shares here. Reason 3: End Users Are Given…

Read More Read More

Top Five Ways You End Up With Open Shares: Part 1

Top Five Ways You End Up With Open Shares: Part 1

Open shares are evil. Sure, there are cases you may need a read-only share open to everyone in the organization. How else will they grab benefits forms or company calendars to print and hang in their cubes? But it’s amazing how often those simple use cases grow into ugly messes. All it takes is one person with the right (or wrong) rights to add write access to that same share, and you have a huge problem. Learn more about open…

Read More Read More

ProTip: Create PII Retention Policies in O365 to Help Abide with GDPR Guidelines

ProTip: Create PII Retention Policies in O365 to Help Abide with GDPR Guidelines

Automate the Process of Disposing of Data With GDPR now in effect, organizations are legally required to remove personal data once its purpose for processing has been met. In March of 2019 a Danish Taxi company, Taxa 4×35, was fined $180,000 for failing to properly dispose of its customer’s personally identifiable data (PII). An audit found that the company was only removing the customer’s name from the documents, however other personally identifiable information such as telephone numbers and address’ remained….

Read More Read More

GDPR – One Year Later…

GDPR – One Year Later…

The penalty for failure to comply with the General Data Protection Regulation (GDPR) is up to $22 million or 4% of annual global turnover (whichever is greater). By now most organizations around the globe know that regardless of where they are based, this regulation affects them if they are doing business with EU citizens. Aside from having a responsibility to properly handling personal data, that amount of money can really hurt your business. For example, under the Data Protection Act of…

Read More Read More

Database Security Best Practices – Simple & Worthwhile Concepts – Part IV

Database Security Best Practices – Simple & Worthwhile Concepts – Part IV

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

Database Security Best Practices – Simple & Worthwhile Concepts – Part III

Database Security Best Practices – Simple & Worthwhile Concepts – Part III

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

DATABASE SECURITY BEST PRACTICES – SIMPLE & WORTHWHILE CONCEPTS – PART II

DATABASE SECURITY BEST PRACTICES – SIMPLE & WORTHWHILE CONCEPTS – PART II

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

Database Security Best Practices – Simple & Worthwhile Concepts – Part I

Database Security Best Practices – Simple & Worthwhile Concepts – Part I

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

How to Implement STEALTHbits Access Library Connectors

How to Implement STEALTHbits Access Library Connectors

With the advent of the STEALTHbits Access Library, today we are going to have a quick Protip in the form of how to best implement these connectors and what the little “gotchas” might actually be. Obtaining Access Library Connectors First, let’s talk about getting the modules downloaded correctly. On the STEALTHbits homepage, there is a “LOGIN” option in the upper-right of the screen: Make sure to login with the credentials provided to you by STEALTHbits! If you don’t have any…

Read More Read More

New! STEALTHbits Access Library – Flexible Access Auditing Across Any Platform

New! STEALTHbits Access Library – Flexible Access Auditing Across Any Platform

Historically most organizations would attempt to standardize on one platform internally for unstructured data and another for structured data. This meant separating off the unstructured data to a singular admin (or team), and the structured off to a different admin (or team) and the business remained divided in that manner. These could take many forms – SharePoint, File Servers, SQL Server, Oracle, OpenText, etc., yet the concept remained the same across all those platforms. With one for each type of…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.