Weekly Tech Tidbit – FRS vs. DFS-R – Time To Convert

In an Active Directory domain, we generally rely heavily on group policies.   Microsoft best practices say that you should have at least two domain controllers.   Most of our clients have two or more domain controllers.   Those domain controllers need to replicate Active Directory information, DNS information, and Group Policy information (i.e. SYSVOL) so that everyone […]

Read more

Weekly Tech Tidbit – Air Gap Backups

When all else fails we reach for the backups.   However, increasingly the bad guys are consciously seeking out your backups and deleting them as part of elaborate ransomware routines to force you to pay to recover your data. This can be as simple as the bad guys deleting your volume shadow copies to as complex […]

Read more

Weekly Tech Tidbit – Where oh where is my data really going?????

One of the key features of the newest firewalls and intrusion protection systems (IPS) has been the addition of something called GeoBlocking. This feature allows the administrator to shut down traffic to or from specific countries or regions of the world and your local network regardless of any other firewall permissions in place.

Read more

Weekly Tech Tidbit – How to stop Google’s syncing madness

Most of Google’s products are free.  The reason is that you are their product.   Their computers read your emails.  They send you targeted ads based upon what you read and write.   They track your location.  They track your likes and dislikes. They have made your life more convenient by syncing all your Google Chrome data.

Read more

Macs Need Advanced Endpoint Protection Too

I can’t tell how many times I have heard from non-technical Mac people that, “they don’t need anti-virus.” The Apple person that sold them their Mac told them that. I have pointed out that Apple’s technical folks make a strong recommendation for anti-virus in their technical documents despite sales claims to the contrary.

Read more

Time to change strategies – Malware increasingly written to be invisible to traditional antivirus

Recently I read an interesting article on malware development techniques.  SentinelOne, Cisco AMP, and other antivirus products rely on the VirusTotal clearinghouse.  This is a clearinghouse that has approximately 67 antivirus vendors. Various antivirus and advanced endpoint products upload suspicious programs to ask, “is this a virus?”.   You get a score back of x/67 for […]

Read more