The reality is that your network is under attack. We need to protect our servers. We need to protect our data. One way we do that is by not remoting into servers to do basic tasks. Almost everything we need to do, we can now do remotely. Also, we can do many tasks with a […]
Do you know how secure you are from the outside world? Maybe you’re new and inherited a network, or there has been so much churn over the years with servers being added and retired and software previously available in-house now being hosted? Maybe you have just lost track of patching? Regardless of the reason, a […]
This tidbit is starting a series on understanding some mechanisms available to you for protecting e-mail sent from your domain. We covered this topic in this month’s Tech Talk / SYSOP meetings but for all those that missed them or those that want a refresher I am covering this again here in this series.
Another short and sweet tidbit. When you are installing software, updates, patches, etc., reboot your server. I can’t tell you the number of times that my “updates” fail because there is a “pending restart” from a previous update. If your update fails after the reboot, it is the update that is the issue.
I have been watching the Cisco AMP and Paladin CyberSentinel Managed Endpoint Detect & Respond consoles for a number of clients of late. One thing is extremely apparent. Your administrators are under constant attack from emails with fake invoices, as well as Microsoft Word and Excel documents – all of which are infected.
This tidbit is a refresher on looking at Cisco Firepower Intrusion Event logs and daily reports. Specifically, I wanted to review for all of you again the meaning of two key columns, the Impact and Inline Result columns The Firepower Impact scale is designed to help the recipient understand where to focus scarce resources first.