The FBI came to visit us last week. No it wasn’t an investigation. It was for CSI’s 3rd annual Security Event. I have talked about the topic of Cyber Threats in person and on-line, but our Supervisory Special Agent had a few interesting things to say beyond the topics Bob and I have been discussing […]
I am watching with some interest a growing trend with district’s implementing newer IP-based building systems (HVAC control, food service temperature controls, door control, video surveillance, etc.) and when properly implemented I think this a fine thing.
As you go through your normal yearly planning cycles remember that in January 2020 Microsoft will be retiring Windows Server 2008 R2, Windows 7, and Microsoft Exchange 2010. That means no security updates and no vendor support if something goes wrong.
In an Active Directory domain, we generally rely heavily on group policies. Microsoft best practices say that you should have at least two domain controllers. Most of our clients have two or more domain controllers. Those domain controllers need to replicate Active Directory information, DNS information, and Group Policy information (i.e. SYSVOL) so that everyone […]
This week’s Tech Tidbit is short and sweet. If you have a server or device that is internet facing, make sure you have a real, commercial SSL certificate on it. Do not use a self-signed certificate. I don’t really care that it is just for “internal” use and you are smart enough to bypass the […]
When all else fails we reach for the backups. However, increasingly the bad guys are consciously seeking out your backups and deleting them as part of elaborate ransomware routines to force you to pay to recover your data. This can be as simple as the bad guys deleting your volume shadow copies to as complex […]
One of the key features of the newest firewalls and intrusion protection systems (IPS) has been the addition of something called GeoBlocking. This feature allows the administrator to shut down traffic to or from specific countries or regions of the world and your local network regardless of any other firewall permissions in place.
Trend Micro has stated many times that you have approximately 4 minutes between when a threat enters your network and the infection breaks out. But who can respond that quickly? I have often said if we leave questions on the computer up to our end users, we have failed.
At some point in your life, you probably were locked out of something – your house, your car, your office. I am sure it was awful trying to figure out how you were going to solve that problem. However, to add to your stress, we now have all this sensitive data online and on our […]
Most of Google’s products are free. The reason is that you are their product. Their computers read your emails. They send you targeted ads based upon what you read and write. They track your location. They track your likes and dislikes. They have made your life more convenient by syncing all your Google Chrome data.