George Chetcuti Blog

Last Updated on 13 June 2016, Total: 712 Blog Posts

George Chetcuti is a promoter of effective IT governance and IT security best practices. With a personal experience of many years managing complex setups, his contribution to this community is to provide security related info and tips. This blog is aimed at increasing security awareness among IT professionals.

11 Cloud Security
150 General
21 Malware
265 News
15 Privacy
64 Security Tips
46 Utilities
140 Vulnerabilities
  1. LepideAuditor Suite 16.3 – now with File Server Current Permission Reporting

    Lepide launched version 16.3 of the popular LepideAuditor Suite. The updated version now features File Server Current Permission Report for the Shared folders and its content. It shows the analyses both effective NTFS permission and effective Share permission to evaluate the currently effective permissions applied on a selected file or folder... Read More

  2. LepideAuditor Suite 16.0 handles the burden of compliance for you

    For IT teams the constant burden of compliance has always been a key cause of stress and worry - until now... Read More

  3. Top Five Cybercrime Patterns to Watch Out for in 2016

    Netwrix sums up the statistics on data breaches in 2015 and identifies types of cybercrime that will potentially affect U.S. companies in the coming year... Read More

  4. December Newsletters Teaser

    Topics covered in,,, and monthly newsletters... Read More

  5. Lepide targets Middle East growth with new distributor

    IT audit and control vendor Lepide has announced its second regional distributor in the last three months with the addition of Dubai based security VAD, RAS Infotech... Read More

  6. Netwrix Selected as 2016 SC Awards Finalist in Three Categories

    Netwrix Auditor was shortlisted for Best SME Security Solution, Best Regulatory Compliance Solution and Best Database Security Solution... Read More

  7. 5nine Software Releases 5nine Cloud Security v7

    The New 5nine Cloud Security v7 Takes Security to the Next Level through Advanced Automation, Logging and Intrusion Detection Features... Read More

  8. Top 7 IT Security Threat Predictions for 2016

    Netwrix sums up top security trends that will drive IT strategy and investment in 2016... Read More

  9. Last chance to sign up for the webinar: How to Plan and Complete a Secure Office 365 Migration

    Live Webinar: December 10, 2015 @ 11am or 4pm EST | 8am PST or 1pm PST, US Time There are many pathways to an Office 365 migration, but completing the migration is only part of the solution. While Office 365 offers capabilities for Identity Management, it’s limited in protecting data once it leaves the platform... Read More

  10. US-CERT Publishes Dorkbot Alert

    Dorkbot-infected systems are used by cyber criminals to steal sensitive information, launch DoS attacks, disable security protection, and distribute several malware variants to victims’ computers... Read More