IT Security News & Blog

CSAM Health Maintains Impressively High Availability Rates with WhatsUp Gold
29 November 2018
Any environment which has SLAs or minimum levels of availability to achieve can become highly pressured one, in which any incident could possibly drag you closer to a red line which you have been mandated not to cross....
3 Ways in Which DMARC Gives Hawk-Like Visibility Over Email Domains
28 November 2018
Every so often, a technology or methodology emerges which could have potentially profound effects on an aspect of IT security globally. Sometimes they are embraced; and other times they cannot find traction with the IT teams of the world and remain shamefully obscure....
3 Reasons Why You Should Know What iMacros Are
27 November 2018
If you ask any IT manager or senior leader, what their priorities are in the coming twelve months. You will get a response along the lines of "more automation". What seems like an obvious pursuit in any field is now becoming a trend in IT circles, as they attempt to find ever increasing ways to lesser the response times and as a result, the human interaction between systems....
Are You Really Still Using Tripwire Enterprise?
22 November 2018
Heavy is the head that wears the crown, is the old saying which comes to mind when I think of Tripwire Enterprise. A solution which has sat at the top of its game for so long that there is only conceivable one direction left....
How Does Ipswitch MOVEit Cloud Stack Up Against the NCSC SaaS Security Principles?
21 November 2018
In almost every conversation we have with a customer today, there is some element discussion around cloud adoption and usage. Particularly in the case of Ipswitch MOVEit Transfer, which launched it managed file transfer cloud offering early this year....
Did You Make the Classic Mistake of Choosing One Vendor for All Solutions?
21 November 2018
When it comes to solution and service offering in the IT and IT security fields. Consolidation has long been a hot topic. The moment something new and innovative comes to the forefront, one of the large vendors snaps it up and buries it in their portfolio kit bag....
How to Monitor Azure Performance and Billing with Ipswitch WhatsUp Gold - Part 2
20 November 2018
In part one of our blog on adding performance and billing monitoring support to Ipswitch WhatsUp Gold, we focussed on collecting the Tenant ID, Application ID and Application Key, in order to create a credential in Ipswitch WhatsUp Gold....
How to Monitor Azure Performance and Billing with Ipswitch WhatsUp Gold
19 November 2018
In previous versions of WhatsUp Gold you may have noticed the introduction of monitoring support for Microsoft Azure and Amazon AWS. Providing you with the ability to monitor virtual devices, applications and even present statistics on your ongoing hosting costs....
New Real-Time Dashboard Added to Ipswitch MOVEit Managed File Transfer
8 November 2018
As the closing months of the year get into full swing, the final service pack for Ipswitch MOVEit 2018 has been released to great fanfare. With new features for both the popular MOVEit Transfer and Automation, sibling solutions....
Ipswitch WhatsUp Gold SP3 is Christmas Come Early
7 November 2018
They say that good things come in small packages; and in the case of the widely popular Ipswitch WhatsUp Gold network monitoring and incident response solution, the release of service pack 3 proves this to be true....
Mandatory Email Encryption for Danish Businesses
24 October 2018
From the 1st of January 2019, all Danish organisations which use email as a mechanism for processing personal data will be required, by law to use a form email encryption. Strictly interpreted by the Danish supervisory authority under article 9 of the GDPR (General Data Protection Regulation)....
5 Foolproof Ways to Improve System & Network Availability
15 October 2018
Ask any IT team what their worst nightmare is and they will likely recant tails of network outages with thumb-twiddling users, panicked management and the embarrassing discovery of a preventable cause....
What On Earth are ITAR Compliant File Transfers?
12 October 2018
That's right, not GDPR or PCI DSS, like most other blogs and articles you might be reading online...but ITAR. The International Traffic in Arms Regulation, which governs the trade and export of defense materials and services in the US....
5 Incredible SharePoint File Sharing Shortcomings to Avoid
11 October 2018
Having worked with file transfer and document automation solutions for a number of years; we have noted a number of common themes or trends which tend to rear their heads over and over again....
Impress Your Boss with Microsoft Azure Logic and Ipswitch MOVEit
10 October 2018
We live in a world of integration and automation. One where isolated or siloed applications are no longer palatable for the complex tasks and operations of the modern organisation....
PRTG Lacks Significant Features Against Ipswitch WhatsUp Gold
20 September 2018
In this blog, we wanted to take a look at two industry rivals in the network monitoring space. German engineering at its best from Paessler, in the forms of PRTG; and the universally famous Ipswitch WhatsUp Gold....
3 Must-Have Security Solutions for AWS, Microsoft Azure and Google Cloud
19 September 2018
Cloud adoption is a topic which we have published a number of blogs on; and have daily conversations about. The benefits of the cloud are well documented, from lower operational costs to better rates of availability....
Ipswitch MOVEit Crushes GoAnyWhere MFT (4 Reasons Why)
18 September 2018
You are probably reading this article for one of two reasons, you are in the market for a managed file transfer solution and have come across either/both Ipswitch MOVEit or GoAnyWhere MFT; or you have worked with them before and are curious about the differences....
How to Simplify the GDPR (5 Incredible DPOrganizer Features)
3 September 2018
There is no shortage of information about the GDPR out there, from the six core principles to data subjects rights to the lawful basis for processing, there is a dizzy number of changes an organisation may need to implement....
How to Achieve SWIFT CSP Mandatory Controls with Time to Spare
1 September 2018
Have you ever met an IT manager, administrator, CISO or compliance officer who had a lot of time on their hands? No, me neither. If they exist, then they are certainly a rare breed!...
Automate File Transfers Like an Expert with PowerShell & Google Cloud
30 August 2018
Today, if you are not embracing the cloud then it would seem you are in a steadily declining minority. Cloud is the buzz term that refuses to die; and so instead we find ourselves in an age of migration toward the cloud or in a state of hybrid network, where the boundaries between cloud and hosted services are blurred....
Service Pack 2 Makes WhatsUp Gold 2018 the Best Version Yet
27 August 2018
The past three months seem to have been a summer which just keeps giving. After deliciously warm weather throughout July and August for almost everyone in the northern hemisphere, we now are given the second service pack for Ipswitch WhatsUp Gold 2018, which promises to be packed full of goodies and features....
What is a ServiceNow Closed-Loop Change Management Process?
21 August 2018
If you or your organisation uses the very popular ServiceNow solution for change management, how do you accurately ensure that intended changes were delivered as requested and approved? Do you assume changes have been made successfully and correctly, if there was no post-change feedback, whether it be negative or not?...
System Hardening & CIS Benchmarks for AWS Cloud Hosted Devices
20 August 2018
How many of you use AWS or another cloud hosting provider such as Microsoft Azure or Google Cloud? The question is of course rhetorical due to the limited medium that is the blog, but in any case my experience tells me that a vast majority of readers do....
Comparing Ipswitch WhatsUp Gold and SolarWinds NPM
17 August 2018
In this blog, we compare network monitoring solutions Ipswitch WhatsUp Gold and SolarWinds NPM....
5 Reasons Why You Should be Investing in Automated System Hardening
16 August 2018
I have no doubt that like most readers, system administrators, heads of IT and CISOs, that you probably have an unending list of desired solutions and tools which you would like to deploy in your networks. Writing business cases and securing the budget for everything would be in reality, impossible; and so instead, prioritisation based on need is a critical factor in deciding what to invest in....
6 Essential Things to Know about CIS Benchmarks
14 August 2018
The old adage says that you should not attempt to reinvent the wheel, as it is both a waste of time and has been perfected already. Instead, it is common accepted that wherever there is an existing standard, one should use that....
3 Network Monitoring Fails Worth Avoiding
3 August 2018
Nobody is happy when the company network and systems are slow. Long wait times caused by slow applications and network speeds drain productivity throughout your organisation. As time goes on without a fix, users will start to lose their patience and faith....
A Guide to Writing an RFP for Selecting and Evaluating an IT Solution
2 August 2018
In this blog, we share some tips on how to construct an RFP (Request for Proposal). It will list the major things to consider when compiling your RFP and provide guidelines on a typical RFP lifecycle....
6 Reasons to Monitor Netflow with Network Traffic Analysis
31 July 2018
One of the most useful things to have in your network monitoring toolkit is Network Traffic Analysis. It collects and processes network flow data, commonly available through features such as Cisco’s NetFlow as well as other network device manufacturers....
5 Things You Didn't Know About Network Monitoring Solutions
27 July 2018
Network monitoring solutions and SNMP (Simple Network Management Protocol) have been around for over twenty years; and has become a staple of many a network. With age comes a scepticism about how innovative such solutions can be; and whether or not they are commoditised, with literally hundreds of vendors offering such tools....
Using IFTTT to Monitor Servers and Network Devices
26 July 2018
Being a bit of a technology philistine at home, I was only recently enlightened to the joys of IFTTT technology and how it is powering home automation and other integrations. I have to admit, as much as I prefer to leave IT to my day job, I was intrigued at the possibilities it could open up; and even more so, how this could benefit organisations....
5 GDPR Modules Added to Innovative Training Solution OutThink
26 July 2018
In bringing your workforce up to speed to ensure compliance with GDPR, you’ll require top quality information security and data privacy training content. The OutThink learning material is developed by industry experts working alongside education professionals, human-computer interaction specialists, psychologists, as well as behavioural change and communication experts....
What is Netflow and Why Do Network Admins Swear By It?
24 July 2018
The level or knowledge or even awareness of netflow is a mixed bag, in my experiences speaking with IT managers and network engineers. Those who have attended accredited courses for network equipment or those networking veterans will be very familiar with the technology. For others, it is a new and exciting technology which can reveal a vast wealth of insight into network traffic....
Extending Network Monitoring to AWS and Azure
21 July 2018
These days it seems that it is almost impossible to find an organisation who is not either using cloud infrastructure services, such as AWS (Amazon Web Services) or Microsoft Azure, or at least experimenting with them. The benefits are attractive, lower operating costs, better resilience and rapid deployment times are just a few....
What is SNMP and is it Secure?
20 July 2018
Whether it be SNMP traps or community strings, there is a very good chance you have heard of this veteran network monitoring protocol at some point in your career. With well over twenty years of existence, the simple network monitoring protocol has provided us with just that, basic insight into the health of network devices, servers and software....
10 Reasons why Network Monitoring Software is a Must Have
18 July 2018
Network monitoring software and solutions are nothing new, starting their humble beginnings with SNMP (Simple Network Monitoring Protocol) in the 1980s. Since then things have progressed to include easier to use protocols for monitoring such as WMI and syslog; as well as SNMP being upgraded to include authentication in version 3....
How to Automate File Transfers and Ditch the Scripts
16 July 2018
After eight years of working with managed file transfer solutions (MFT), there is one use case which pops up time and time again....
Tripwire Enterprise and NNT Change Tracker (Who Would Win in a Fight?)
13 July 2018
When it comes to FIM (File Integrity Monitoring) and secure configuration management. there are two main solution vendors worth considering. Tripwire Enterprise and NNT Change Tracker. Both have impressive existing customer rosters and reputations; are multi-million pound businesses and have an international presence. But which solution is better?...
5 Reasons to Consider Managed File Transfer in the Cloud
11 July 2018
Storing sensitive files and personal data in the cloud can be a touchy topic for some, keeping even the most seasoned information security leader or data protection officer awake at night. Although, despite what the humble salmon teaches us about swimming against the tide, it is hard to fight against the unstoppable trend towards cloud adoption....
OutThink is Recognised by GCHQ and HMG as the Leader in Cybersecurity Training
10 July 2018
Pioneers in cybersecurity culture and cognitive training solution vendor OutThink Threats has been awarded by GCHQ (Government Communications Headquarters) as a preferred supplier to government departments in the UK....
ENISA's 8 Step Plan for Building a Risk Aware Cybersecurity Culture
9 July 2018
There is almost universal recognition that traditional security awareness raising campaigns, such as those which leverage legacy CBT and phishing simulations are not, in themselves, affording sufficient protection against cyber attacks....
How to Simplify GDPR with a Dynamic Privacy Policy
6 July 2018
The GDPR (General Data Protection Regulation) is a difficult beast, with some estimates as low as 15% for the number of organisations who considered themselves GDPR ready by May 25th 2018. Not a surprise then considering the debacle that was re-consent email deluge and the "we have changed our privacy policy" communications that flooded everyone's inbox....
What is the Difference Between FTP and Managed File Transfer?
5 July 2018
It may be obvious to some that FTP (File Transfer Protocol) is an insecure protocol; and that its continued use for transferring sensitive or personal is inappropriate. Yet, its use for that very purpose still continues according to Rapid7, creating an unnecessary risk....
What is the UK's New Minimum Cyber Security Standard?
30 June 2018
This week has seen the release of a new baseline of mandatory cyber security requirements for UK government departments. Known as the Minimum Cyber Security Standard, it creates a minimum set of measures which all government departments will need to adhere to, although the hope is that as a baseline, they will in fact seek to exceed these at all times....
5 Benefits when Using Secure Email and Attachment Solutions
25 June 2018
Do you send sensitive documents and files using regular email? Could you do more to protect those documents and files to ensure their confidentiality? These are just two of the more obvious questions which many an IT administrator and security officer are now asking their organisations, as the world and it's regulators become more focussed and stringent on data protection....
7 Key GDPR Questions & Considerations for Ongoing Operational Success
11 June 2018
Now that the General Data Protection Regulation (GDPR) is live and enforced, the focus has shifted from how to comply with how to maintain the controls and processes which have been implemented. While this may just seem like a continuation of what has been achieved already, it is in actual fact a moment to improve. Those processes and changes which were rushed or not properly embedded into day-to-day operations will now need to be cultivated amongst staff for the long haul....
7 Considerations for GDPR Subject Access Requests
10 June 2018
Is the board listening? We all know that GDPR will be enforced from 25th May 2018, but is your board aware of their new privacy obligations? While there is substantial GDPR coverage in the technical press, has the message got through to senior management?  Are their preparations adequate?...
How to Create a PCI DSS 3.2.1 Compliant MFT Solution
8 June 2018
As of May 2018, payment merchants and other credit card handling organisations will need to have familiarised themselves and have implemented the latest iteration of the PCI-DSS (Payment Card Industry - Data Security Standard). Version 3.2.1 expands on what is already a comprehensive and well-known standard by adapting to the rapidly changing climate of data protection, privacy and vulnerability management....
What is File Integrity Monitoring and How Does it Work?
7 June 2018
FIM or File Integrity Monitoring, is without a doubt a highly important layer of defence in any network worth protecting. Required by data security standards such as PCI-DSS and recommended by auditors and security practitioners globally. FIM monitors critical system files, operating system components and even network devices for unauthorised changes....
Is Your MFT Solution Ready for PCI-DSS Ending Acceptance of SSL / Early TLS?
6 June 2018
As of the 30th of June 2018, the use of SSL/early TLS in PCI-DSS (Payment Card Industry Data Security Standard) card environments will no longer be accepted as a compliant protocols by the PCI security standards council and thus could render your accreditation as invalid. What does this mean for you and your managed file transfer solution?...
5 Ways an MFT Solution Can Help You Look Like a GDPR Genius
5 June 2018
The GDPR (General Data Protection Regulation) has for some, fundamentally changed the way that businesses operate, with regard to the collection, processing and transferring of personal data. What is often referred to as the world's most forward-thinking data protection regulation, has forced data controllers to ensure basic levels of security are in-place in order to reduce the risk of loss, disclosure, unauthorised processing, deletion or manipulation....
Achieving PCI-DSS with File Integrity Monitoring
4 June 2018
Has there ever been a more confusing data security standard than the PCI-DSS? Even now, thirteen years on from its initial release, a clear understanding of what you need to achieve to be compliant may still be a challenge....
How to Eliminate FIM Change Noise Once and For All
3 June 2018
For some, a FIM (File Integrity Monitoring) solution is a compliance necessity, for others it features as a core component of their change management process. In either case, file integrity monitoring provides a mechanism for alerting when applications, system files or configurations change unexpectedly....
The 10 Minute Guide to Managed File Transfer (KISS Approved)
2 June 2018
Irrespective of which industry your organisation belongs to, facilitating collaboration and the sharing of files and documents among your employees, customers and business partners is a key requirement for increasing your revenue generation potential. Effective collaboration with employees, customers and business partners means that at some point, files and documents will need to leave the security and boundary of your organisation....
Ipswitch MOVEit Managed File Transfer "Ticks All the Boxes" for Systematic
1 June 2018
IT solutions provider Systematic have chosen Ipswitch MOVEit Transfer as their MFT (Managed File Transfer) solution, describing the offering as "ticking all the boxes" after evaluating other competing solutions against GDPR and ITAR requirements.....
Advanced Cyber Solutions is Announced as Ipswitch Partner of the Year
12 May 2018
Advanced Cyber Solutions, have been awarded the Ipswitch Partner of the Year for Northern Europe, in recognition of their unrivalled service in the region. "From pre-sales all the way through to post-sale, Advanced Cyber Solutions are trained and accredited to help their prospects and customers. From day one of signing with Ipswitch, the team have been committed in gaining both technical, sales and training certifications available, ensuring they have access to the resources Ipswitch engineers use internally." - Matt Scotney-Jones, Ipswitch Regional Channel Manager for Northern Europe....