Today we continue our look at a series of practical steps that districts can use to increase their NIST compliance. Looking at the complete set of NIST controls can be a daunting experience. One of the best ways we have found to make these cybersecurity improvements more attainable is following the CIS Controls Top […]
Controlled Use of Administrative Privileges / DETECT / PROTECT..Change Default Passwords..Ensure the Use of Dedicated Administrative Accounts There is a lot here to unpack. If you haven’t done so already, you should try very hard to break your reliance on the default “Administrator” account.
As we continue our NIST series, I am going to take a moment and discuss inventory and control of software assets in the IDENTIFY / RESPOND category There are a number of practical ways to better control our software inventory.
Weekly Tech Tidbit – Guarding The Wall “Son, we live in a world that has walls, and those walls have to be guarded by men with guns” -Col. Jessep “A Few Good Men” That classic movie line rings true on all our networks.
“Clean up, clean up, everybody, everywhere, Clean up, clean up everybody do their share” -Barney That song has been stuck in my head recently having two Kindergarten aged kids in the house. However, after many of the conversations I have had with you over the last few weeks, it seems an appropriate message this […]
“When it absolutely, positively has to be there overnight” – FedEx As many of you know, Bob and I have been doing this for a while – 41 years in fact. And through all those years, every day is new and fun. Thanks for your support and friendship and trust through all those years.
Last time I talked about making email safer. I focused on inbound email to your users and outbound encrypted emails. However, I neglected to say that advanced spam filters also work outbound. That means that your end-users email and attachments will be scanned to protect against an inadvertent sending out of malicious content.
Last week I talked about the importance of Cloud Backup in our new remote teaching and learning and back-office school environments. This week I am going to talk about secure and reliable communications. The reality is that the number one threat to your network is your users clicking on attachments or web links that lead […]
Disk encryption is growing in popularity as a means of better-securing laptops and desktops. Microsoft is offering BitLocker natively in Windows 10. Microsoft Endpoint Configuration Manager has a built-in BitLocker Administration console. If you don’t have SCCM, then Microsoft offers the MBAM console to manage encryption.
For the last few years Microsoft has been talking about “Modern” this or “Modern” that. In the quest for improved security they are agressively trying to move everyone to more modern protocols. The impending LDAPS changes are an example of this. However, there are more processes and protocols that they are urging you to retire.