Should you monitor your employees’ online activities?

To monitor or not to monitor — that is the question. Employee monitoring is a touchy subject. If you’ve ever considered it, then you may ask yourself if it is a good idea for an employer to check on their staff’s online activities. Below are the pros and cons of employee monitoring, and some helpful […]

Weekly Tech Tidbit – Remote Risks and Compliance Part II – Secure and Reliable Communications

Last week I talked about the importance of Cloud Backup in our new remote teaching and learning and back-office school environments.

This week I am going to talk about secure and reliable communications.

The reality is that the number one threat to your network is your users clicking on attachments or web links that lead to bad places that can potentially launch an attack against the user and ultimately your physical and cloud network resources.

Watch out for this Android malware

Security researchers have discovered a new Android malware called DEFENSOR ID that snuck its way into the Google Play Store. Forensic analysis shows that the malware takes advantage of an Android device’s Accessibility Services to infiltrate the system and cause damage without being detected. To help you avoid this dangerous strain of malware, we’ve compiled […]

Weekly Tech Tidbit – Secure Your Endpoints with Disk Encryption

Disk encryption is growing in popularity as a means of better-securing laptops and desktops.   Microsoft is offering BitLocker natively in Windows 10.   Microsoft Endpoint Configuration Manager has a built-in BitLocker Administration console.  If you don't have SCCM, then Microsoft offers the MBAM console to manage encryption.

How to protect your business printers from hackers

Organizations spend resources on keeping their technology and devices secure, but they often overlook one crucial piece of hardware: printers. Printers, just like computers and Wi-Fi networks, can be an entry point for hackers and a gateway to your business’s sensitive information. Here’s what you need to know about keeping your printers secure. What makes […]

Here’s what to look for when buying antivirus software

Because of the global pandemic, work from home is now a necessity. This has increased the potential entry points for cybercriminals to infiltrate your network. Now more than ever, businesses need better cybersecurity protection. That’s why it’s important to choose the right antivirus software for your needs. If you’re in the market for one, consider […]

Tech Tidbit – Closing Time. Protocols and Processes that have to go!

For the last few years Microsoft has been talking about "Modern" this or "Modern" that.  In the quest for improved security they are agressively trying to move everyone to more modern protocols.  The impending LDAPS changes are an example of this.   However, there are more processes and protocols that they are urging you to retire.

Tech Tidbit – Your Battle – Deny Lateral Movement vs. Momentum

I constantly harp on denying the bad guys access to your network, and if they are inside already, denying lateral movement.  At the last Tech Talk, I mentioned that I am watching many of the Paladin Sentinel Monitoring sites just RDP into all the servers with the true Domain Admin Administrator ID - just like we did 15 years ago.