The beginning of the year is a great time to look at your organization and ask an important question: Who has access to our data? Answering this question honestly can be a bit of a challenge, so we’ve come up with a few guidelines to put you on the right track:

  1. Remove any unused accounts
    • If you’ve had an employee change roles (or leave altogether) you’ll likely find that they have several accounts that need to be modified/removed
    • These include Active Directory, web application, Line of Business applications, and Office 365 accounts
  2. Checking domain credentials
    • Make sure that your password requirements provide the security you need
    • Ensure that administrator accounts have unique passwords
  3. Check security groups and folder permissions
    • Update your security groups to adjust for any changes in roles/needs
    • Review your folder permissions to make sure the right people can see the right data
  4. Have everyone change their account passwords
    • Regularly changing passwords is one of the best ways to maintain security
    • Online applications and accounts often require the changes to be made manually
    • Scheduled (required) changes can be implemented in active directory environments

Not sure how to get started? We’re here to help. Call ETC TechSolutions at 234-200-0800 option 2 or email support@etctech.net. We can perform full network assessments and dark web scans you full control over your data. Looking for more info? Click here to schedule a call with an ETC team member.