Is their anyway to prevent users saving data locally onto their local hard discs on their workstations, and can you differentiate between drives that are encrypted that are ok to save locally, and unencrypted drives that aren’t ok to save locally, or for piece of mind deny such a process on either. We have many information systems that have export features, or report features, whereby the user could potentially save data locally on their unencrypted C drive. My understanding was boot CD’s with an alternate operating system essentially can be used to bypass authentication and then it’s a relatively easy process to access any data resident on the machine, so any extracts of corporate sensitive or personal data would be obtainable with physical access to the PC.
Is there anyway corporately across a domain full of workstations to deny users the ability to save data locally. I am not convinced the less security savvy of our employees will know the risk, but even if they did I am not sure others will abide by any verbal recommendations. If all devices were encrypted does it matter as much if they can or can’t save data locally? Or should it still be denied? What if they need to work in an environment whereby they won’t have network access, what’s the solution then?
Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.
Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller.
Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …