Blog | Cryptzone Insight

Managing SharePoint access for external users

Posted on Jul 23, 2014

One of the objectives that led the development of Microsoft SharePoint was to provide organizations with a platform they could use to set up and manage their intranet portals with a minimal technical overhead. It was also conceived as a way to give employees a central location to store and share internal documents, cutting down [...]

Read More

Password security – friend or foe?

Posted on Jul 16, 2014

Authentication techniques, combined with authorization rules, often represent the first and last lines of defense in IT security. The two concepts are the twin pillars of access control, around which all other principles are centered. Most of the time, authentication comes down to the tried and tested combo of a username and password. The password [...]

Read More

Lack of compliance audits puts confidential SharePoint content at risk

Posted on Jul 11, 2014

Microsoft SharePoint was designed to provide tools for efficient collaboration and content management, and in those areas it excels – the platform is now ubiquitous in workplaces around the world. Healthcare providers, government bodies and the financial services sector all have SharePoint implemented, with some farms supporting thousands of users and millions of documents. Unfortunately, [...]

Read More

Stopping Snowden: what could the NSA have done differently?

Posted on Jun 27, 2014

Edward Snowden's National Security Agency (NSA) leaks last year are causing organizations to rethink the way they are storing sensitive data.  In fact, Edward Snowden's release of NSA information has been so far-reaching that it's easy to ignore the underlining facts.   To begin with, Snowden wasn't an elite hacker with significant years of experience [...]

Read More

Calculating the cost of a data breach

Posted on Jun 25, 2014

Data breaches come in many forms. Some are the result of opportunistic employees with wide-open access to a business network, while others are coordinated by cybercriminals on the other side of the world via malware and phishing attacks. Some involve the theft of intellectual property by a company's competitors, while others result in masses of [...]

Read More