We always have the Paladin Sentinel Monitoring console up during the day. I am still seeing mass use of the domain administrator account to RDP into servers and lots of daily RDP connections in general. There are legitimate reasons to RDP into servers.
This month we talked about how the Ukraine situation affects the cybersecurity landscape for the US and what it means for network security. Leading this discussion was Jason Whitehurst, a cybersecurity professional of over 20+ years, and Vince Crisler, former White House CISO and DarkCubed founder and CEO. Scott Quimby had the opportunity to listen […]
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
Just when you thought it was safe to move along to other technical topics, along comes Scott Quimby’s Hardening Active Directory Part III to scare you even more. If you haven’t watched Part I and Part II, you can find them here. In Part III we will do a little review of some core topics […]
We are so focused on our networks being breached and the bad guys gaining a foothold to steal our money and personally identifiable information that we often forget is that we as techs can make mistakes and inadvertently give away access to sensitive/confidential parts of the network.
The reality is that your network is under attack. We need to protect our servers. We need to protect our data. One way we do that is by not remoting into servers to do basic tasks. Almost everything we need to do, we can now do remotely. Also, we can do many tasks with a […]
It is important to have accountability to the taxpayers independently proving that each school district has adequate financial controls in place and is properly managing the money it has been entrusted. In this era of identity theft, ransomware, and electronic financial theft, it is equally important to have adequate technical controls in place to protect […]