Skip to content

Why Microsoft Active Directory is High Risk for Cyber Attacks [Infographic]

Ninety-five percent of Fortune 1000 companies use Microsoft Active Directory for authentication. Because Active Directory (AD) is not on the radar of most organizations as a target for cyber attacks, it’s often overlooked and vulnerable. Check out our infographic for more, and then download our ebook on protecting your Active Directory here.

Continue Reading →

Skyport Systems at RSA 2017: Active Directory Assessment Data Show Over 90% of Environments Likely Hackable

Hear what our customers are learning and sharing about securing Active Directory, and find out if your environment will stack up against the latest threats.

If you’re headed to RSA this year, here’s how to get in touch, so we can show you how to run your most business-critical applications safely.

This year’s RSA Conference, held in San Francisco, Calif., Feb. 13 to Feb. 17, is sure to be ripe with inspiring security innovation. With more than 45,000 individuals and 500 companies that participate in the conference each year, it’s a show not to miss, and Skyport Systems has quite a few things going on.

Check out the activities below and find one that works for you.

Continue Reading →

3 Hot Trends in Cybersecurity the C-Suite Is Talking About Right Now


Cybersecurity sometimes feels like a game of cat and mouse—new technologies and even familiar hacker capabilities are constantly testing protections, and requiring the security sector to put out and prevent potentially destructive attacks.

Today, we’ll look at three of the top issues in cybersecurity that the C-Suite is talking about right now, and suggest some ways you can prepare.

Continue Reading →

Your 2017 IT Security Checklist

Computer and Tablet

As we head into 2017, cybercriminals still have the advantage. This is despite the billions of dollars worldwide we sink into cybersecurity.

This is concerning—especially since most of the attacks we face are predictable. For example, there’s a lot of hype around hacking events (like blaming whole countries on them), but the truth is that most data breaches fall into common areas of attack.

(Get your instant download of the 2017 IT security checklist here, or keep reading for another chance to download later.)

Continue Reading →

5 Critical IT Security Questions You Need Answers to in 2017

Locked Gate

When you think about securing your IT environment, what’s top of mind? The answer is usually preventing data breaches and protecting critical data—intellectual property, information on people and so on.

When we look at the systems that need to be secured in order to protect those data sets, many often overlook Microsoft Active Directory.

Used by more than 90 percent of organizations, when Active Directory is compromised, attackers can gain access to the entire IT infrastructure. You may not realize it, but this application is currently under heavy attack because our adversaries know its value.

Let’s take a closer look at the five critical questions to ask about your IT security that you may not have thought of.

(For a deeper dive into this topic, check out a recent webinar on critical security questions CIOs are asking.)

Continue Reading →