In this week’s Tech Tidbit I want to talk a bit about the importance of implementing proper control of DNS as part of your malware protection program. DNS lookups and / or the hijacking of DNS lookups are an often-used tool by many malware agents to help enable the success of their intended attacks.
Your Weekly Tech Tidbit – Proper DNS Control
Come play hacker and defender at CSI’s 2nd Annual Security Event Tuesday December 5th
In the real world, it’s no longer a matter of if an attacker will get in, but when and for how long. Is your district really prepared? I am pleased to invite you to 2nd Annual Security event on Dec 5, 2017, in our offices in Fishkill. This year’s event will feature actual hands-on experiences […]
How to troubleshoot email for Google Apps – Tuesday December 12th
One of the most frustrating things for users and the technical staff that support them is erratic email flow. Often users and staff don’t know that their email is stuck or being rejected. By the time the technical staff often realize there is a problem, a whole lot of email has backed up – or […]
UserLock – A Better Way to Improve Active Directory Security and Reporting – Recording Available
I have been talking over the past year about “Hardening Active Directory”. In those discussions, we have been talking about implementing a granular password policy so that you K-2 students have a lower password requirement than your financial and guidance users.
Scott’s Tech Tidbits – November Edition – Recording Available
The October Tech Talk meeting was jammed packed with information. There was more information than time allowed us to present. Therefore, Scott is going to do a special November Tech Tidbits webinar presentation on Tuesday November 14th at 10:30 am.
Why You Have to Eliminate Local Administrator Rights
Welcome to the second installment of, “Weekly Tech Tidbits”. This week I am going to answer a very common question, “Why do we have to remove local Administrator rights to workstations?” The answer is quite simple. Almost every single attack on your network begins on a workstation.