There has to be a different approach to data breaches and data losses. Consumers have become complacent in breach after breach. Companies should be advocating their controls and abilities.
Helpful Microsoft Security Links Top Trends in cyber security 10 Immutable laws of security NIST Controls 800-53
SQL Users with matching passwords
use MASTER go SELECT [name],[type_desc],create_date,modify_date,password_hash FROM sys.sql_logins WHERE PWDCOMPARE(lower([name]),password_hash)=1 –Note: Have experienced where case matters or PWDCOMPARE(upper([name]),password_hash)=1 or PWDCompare([name],password_hash)=1 order by [Name]
SQL Login Trigger
Purpose: Enables auditing of logins on a server. Steps: Download the attached script Run the script Create Login Trigger
NIST updates Cybersecurity Framework
It’s a big day, NIST has released their much anticipated Cybersecurity Framework, version 1.1 is now available here: https://www.nist.gov/cyberframework Credit: N. Hanacek/NIST