sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • IT and Security Managed Services
      • Cloud Services
      • Digital Transformation
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Forensic & Valuation
      • Insurance Services
      • Human Capital Management & Payroll
      • Wealth Management
      • Transaction Advisory
      • Site Selection & Incentives
      • Regulatory, Quality & Compliance
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Contact

Security

View All Sikich Insights
active directory security

Easy Wins for Active Directory – Part 1

Reading Time: 7 minutes
  • July 1, 2019
  • Information Technology | Security | Technology
Is your first penetration test around the corner? Active Directory is a prime target for internal pentests and is commonly misconfigured. The intent of…
Read More
Working on computer

Remote Access Software Best Practices

Reading Time: 6 minutes
  • July 1, 2019
  • Security | Technology | Tips & Tricks
Remote access software is deployed by countless organizations across a variety of industries. As a practical method to manage environments without being physically present,…
Read More
Silex malware

New Internet-of-Things (IoT) Malware Silex

Reading Time: 3 minutes
  • June 27, 2019
  • Security | Technology
IoT (Internet of Things) is not a new concept, even if it’s a newer term. However, for those of you who are unfamiliar with…
Read More
ransomware response plan

Responding to Ransomware

Reading Time: 9 minutes
  • June 24, 2019
  • Security | Technology
So you get to your desk, expecting a regular Monday morning, coffee in hand, anticipating the heap of emails that piled up over the…
Read More
A hand reaching out through a laptop computer and signifying a c

How to Catch PowerShell Script Attacks

Reading Time: 4 minutes
  • June 24, 2019
  • Security | Technology
Would you be able to detect an attacker running PowerShell on your network? As penetration testers, it’s rarer than you might think for our…
Read More
internal penetration testing

The Importance of Internal Network Penetration Testing

Reading Time: 5 minutes
  • June 19, 2019
  • Security | Technology
Focusing on locking your network down from the outside is great. However, the hard truth is that, in all likelihood, someone will get in…
Read More
Risk assessment

MultiRelay – Responder’s Overlooked Little Brother

Reading Time: 7 minutes
  • June 17, 2019
  • Security | Technology
Laurent Gaffié’s Responder tool is a standard go-to tool in a penetration tester’s toolbox. It’s likely one of the first tools run when simulating…
Read More
Intel processor security flaw

Another Processor Security Flaw

Reading Time: 3 minutes
  • June 17, 2019
  • Information Technology | Security | Technology
Intel is arguably one of the most well-known technology manufactures in the world. They create the CPUs that are in the majority of computers,…
Read More
Man Checking Mobile Is Charged At Airport Security Check

A Road Warrior’s Guide to the Galaxy (or at Least the International Terminal)

Reading Time: 10 minutes
  • June 5, 2019
  • Security | Technology | Tips & Tricks
We live in a world connected by big jetliners and work for companies that expect us to be on site with clients across the…
Read More
maintain ERP data security

Nine Ways to Maintain ERP Data Security

Reading Time: 10 minutes
  • May 31, 2019
  • ERP | Security | Technology
We’ve previously gone over the types of ERP cyberattacks as well as how attackers are exploiting these security risks to obtain access. But the question,…
Read More
Hacker in data security concept

Cyberattacks on ERP Systems

Reading Time: 5 minutes
  • May 31, 2019
  • ERP | Manufacturing | Security | Technology
Did you know that Sikich is one of only 14 companies in the US certified by the Payment Card Industry Security Standards Council (PCI…
Read More
Business, technology, internet and networking concept

How Mobile Devices Put Your Business at Risk

Reading Time: 3 minutes
  • May 15, 2019
  • Security | Technology
Statistically speaking, 53% of everyone reading this article is on a mobile device. A short 10 years ago, the average person didn’t even own…
Read More
tsql shortcut

SQL Backup Notifications – The Next Step in Data Security

Reading Time: 3 minutes
  • April 29, 2019
  • Security | Technology
Data integrity and protection are two of the most important tenets of using SQL databases. In most cases, IT will set up daily backups…
Read More
small business ransomware

Cyber Extortionists Targeting Small Businesses

Reading Time: 4 minutes
  • April 15, 2019
  • Security | Technology
You may have seen recent news articles about large organizations, such as manufacturing giant Norsk Hydro, Garfield County, Utah, and the City of Albany,…
Read More
Office 365 breach detection

Office 365: Breach Detection with Cloud App Security

Reading Time: 4 minutes
  • April 11, 2019
  • Office 365 | Security | Technology
I previously wrote about reviewing Office 365 accounts that you suspect being compromised using the Audit Log. This is useful when you are doing…
Read More
security plan

Tornadoes and Hackers

Reading Time: 2 minutes
  • April 9, 2019
  • Security | Technology
Earlier in March, tornado emergency sirens went off across a couple of cities in Texas in the middle of the night, waking people up…
Read More
how to create Windows public keys

Creating and Using Key Pairs in Windows

Reading Time: 6 minutes
  • April 8, 2019
  • Security | Technology
Instead of sharing passwords for files, public-key encryption provides a great way to securely exchange files, documents, and other sensitive data. The following is…
Read More
Office 365 email breach investigation

New Capability in Email Breach Investigations Within Office 365

Reading Time: 3 minutes
  • April 4, 2019
  • Office 365 | Security | Technology
Dealing with account breaches is never an enjoyable activity. It typically gets even more sour when you can only get limited information on what…
Read More
Office 365 audit log

Office 365: Compromised Account Review with Audit Log

Reading Time: 4 minutes
  • April 1, 2019
  • Office 365 | Security | Technology
Imagine this scenario that System Administrators are more commonly being faced with: An end user forwards along an e-mail inquiring about its legitimacy. The…
Read More
password security breaches

Regarding Security Breaches and Passwords

Reading Time: 3 minutes
  • February 15, 2019
  • Security | Technology
Two of the most frequently asked questions that come across my desk are “Do I need to worry about the ‘fill in the blank’…
Read More
« Previous Page1 … Page5 Page6 Page7 Page8 Page9 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.