UK companies are in danger of slipping into serious compliance breaches if they don't have their GDPR plans in place by May 2018.
The law is already in place, but companies have a grace period to enact their own policies. Failure to comply… more on page 8.
Think W3 Limited, an online travel services company, has been served a £150,000 monetary penalty after a serious breach of the DPA revealed thousands of people’s details to a malicious hacker.
Sony will pay up to $10,000 to each claimant for identity theft losses and up to $1,000 each to cover the cost of credit-fraud protection services in connection with a cyber attack on the firm in 2014.
An online holiday insurance company has been fined £175,000 by the ICO after IT security failings let hackers access customer records. More than 5,000 customers had their credit cards used by fraudsters after the attack on Staysure.co.uk.
Attackers potentially had access to over 100,000 live credit card details, as well as customers’ medical details. Credit card CVV numbers, the security number on the signature strips of the cards, were also accessible despite industry rules that they should not be stored at all.
Thousands of Morrisons' employees are to sue the supermarket giant in what is believed to be the UK’s biggest ever claim in relation to a breach of data security.
Although awareness of the information security risks posed by compromised or disgruntled insiders is rising, few organisations are taking adequate steps to detect and shut down insider attacks.
Simplify compliance and management reporting across your Windows-based enterprise.Recovery Manager for Exchange REMEDIATE
Quickly and easily recover Exchange and email data without a dedicated recovery server.Active Roles REMEDIATEMANAGE
Simplify the security of your Active Directory.
Capture, analyze and act on information about workforce activities and busines processes.InTrust ASSESSAUDITMANAGE
Securely collect, store and receive event data from Windows, Unix and Linux systems.Defender AUDITREMEDIATE
Defender enhances security by requiring two-factor authentication to gain access to your valuable network resources.
Manage Microsoft server security in real time from a single platform.Active Administrator ASSESSAUDITREMEDIATEMANAGE
Streamline Active Directory security and Group Policy ManagementChange Auditor REMEDIATEMANAGE
Get complete, real-time change auditing, in-depth forensics and comprehensive reporting
"Together, ChangeAuditor and InTrust satisfy the needs of our auditors and management in full."Business need
Driven partly by the need for compliance with global and industry regulations and standards, Platinum Bank needed to improve security by implementing Windows (AD and Exchange) auditing and event log management.Solution
With ChangeAuditor for Active Directory, ChangeAuditor for Exchange and InTrust, Platinum Bank can now keep abreast of changes to Microsoft® Active Directory® and Exchange in real time, so issues can be quickly identified and resolved.Benefits
"Evaluating all the solutions took around three months, not counting the preselection. After that, we were certain that we'd made the right decision in choosing Quest Defender."Business need
The City of Frankfurt wanted to introduce greater workplace flexibility through homeworking to help employees find the right balance between work and their private lives.Solution
The authority deployed two-factor authentication software Quest Defender, giving staff secure access to data from outside the office.Benefits
"Before we implemented Quest Security Active Roles, our Active Directory management was quite chaotic. Access rights were not under control."Business need
To streamline and gain control of a complex Active Directory infrastructure that included an unruly number of domain admins, unstandardized naming conventions, and encompasses 10,000 users in 1,000 retail shops, located in 19 countries.Solution
JYSK implemented Quest Active Roles into its Active Directory (AD) environment, which immediately paid off by delivering enhanced management, tighter controls – and facilitated approval workflows that ensured requested changes are necessary and that all required parties sign off on them. Plus, it reduced domain-admin access by more than 90 per cent.Benefits
"Implementation of Change Auditor enabled us to cut the time spent investigating information security incidents related to unauthorized access to data located in our corporate information systems in half."Business need
To move to a risk-oriented information management model and ensure regulatory compliance, Dragon Capital needed better visibility into user access rights changes in real time. The company also wanted to reduce IT workload by streamlining security investigations of critical changes, such as modifications of system configuration or user access rights.Solution
With Quest Change Auditor, Dragon Capital is able to audit changes to user access permissions and easily meet its compliance requirements. The solution issues alerts about critical changes in real time and enables the IS team to investigate and resolve incidents in minutes rather than hours or days.Benefits
Bolster the security of your Windows server environment. Quest security and compliance automated solutions provide real-time visibility into administrator and user activities, plus report on server configurations and user permissions. Ensure compliance with HIPAA, PCI, SOX, FISMA, GDPR and more with audit-ready reports.
Supported platforms include:
Complement your governance, risk and compliance initiatives with solutions that help you achieve and prove compliance, and streamline administration for complex, growing environments.