Archive for the ‘Best Practices’ Category

 

A New Opportunity for Your IT Pros to Protect your Servers

Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. Continue reading ‘A New Opportunity for Your IT Pros to Protect your Servers’


How Buying a Spare Printer can Vastly Improve Your Cyber Security

Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Continue reading ‘How Buying a Spare Printer can Vastly Improve Your Cyber Security’


When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush

It is like someone borrowing your toothbrush without you knowing, and you get sick from their germs. Think of programs on computers as being something that can be used to make you sick. As 2018 continues, more attackers will use trusted software as a vector to infect networks. Continue reading ‘When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush’


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling. Continue reading ‘Patching Nightmare – Please Forward to Your IT Pros’


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, Continue reading ‘Three Serious Trends to Watch Out for in Cyber Security’


About Half of All Breaches are Caused by a Contractor or Service Provider

In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Continue reading ‘About Half of All Breaches are Caused by a Contractor or Service Provider’


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. Continue reading ‘One Setting Can Protect Your Network from Ransomware’


Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much easier for attackers to cover their tracks. Continue reading ‘Please Alert Your IT Pros – Increase Your Security Log File Capacity’


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong.  Continue reading ‘Do the Basics. Do not Believe that Threat Protection Software Will Save You.’


New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure

The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing. Continue reading ‘New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure’