The call came in. We have a serious virus outbreak. Can you help? Over the years we have been asked this question time and time again. Viruses have been predictable. Their infection routes could be easily discerned. Then it became a matter of discipline – Update clients, scan systems, re-image trashed machines.
The 2018 Yankees have taken the field. We’ll all find out soon who is playing second and third base. In the meantime, I want to continue my discussion of the basics of patching. Many sites decide not to patch or patch only in the summer.
Now that the NFL season is over we turn our eyes to Valentines Day when Yankees Pitchers and Catchers report for Spring training. It is the time of the baseball year when we go back to basics to shake the rust off the foundational aspects of the game.
I wanted this week to take a few minutes to share with you our latest thinking on the Intel Spectre and Meltdown fiasco. In a nutshell, there are two issues: An actual hardware flaw that exists in Intel and other compatible processor chips.
One area of security we often overlook is that of the servers themselves. Most of our servers have some sort of remote access card built into them to provide remote access in case the server is hung up as well as to provide enhanced alerting of hardware errors.
One of the most frustrating things for users and the technical staff that support them is erratic email flow. Often users and staff don’t know that their email is stuck or being rejected. By the time the technical staff often realize there is a problem, a whole lot of email has backed up – or […]
The requirements of K-12 are increasingly for anytime, anyplace learning as students use various devices both inside the district and at home. One to one initiatives are stretching our ability to reliably deliver the applications that our students and staff need access too.
Back in May 2015 we started talking about the Microsoft Group Policy security change to prevent a “man in the middle attack” where any Group Policy that you test with security filtering for group membership will no longer operate with the default “Authenticated Users” on the delegation tab.
You will find on our web site under Webinar recordings, Hardening Active Directory Part I and also Part II. If you haven’t watched those presentations, you should to understand the threat to your Windows networks. One basic concept you can start with is to realize that all the Group Policy security settings are found in […]
One of the most frustrating things for users and the technical staff that support them is erratic email flow. Often users and staff don’t know that their email is stuck or being rejected. By the time the technical staff often realize there is a problem, a whole lot of email has backed up – or […]