You will find on our web site under Webinar recordings, Hardening Active Directory Part I and also Part II. If you haven’t watched those presentations, you should to understand the threat to your Windows networks. One basic concept you can start with is to realize that all the Group Policy security settings are found in […]
For years the best practice, and rules the most auditors hold IT departments to when it comes to secure password policies have included the following: 1 – Passwords should be at least 8 characters minimum and must contain complexity (use at least 1 number, 1 upper case character, and 1 special character) 2 – Passwords […]
Previously we talked about limiting the use of “local administrators” to improve the security of your network. However, we do actually need a local administrator account to exist because, sooner or later, a tech is going to need that account to properly install software or update the machine.
In this week’s Tech Tidbit I want to talk a bit about the importance of implementing proper control of DNS as part of your malware protection program. DNS lookups and / or the hijacking of DNS lookups are an often-used tool by many malware agents to help enable the success of their intended attacks.
In the real world, it’s no longer a matter of if an attacker will get in, but when and for how long. Is your district really prepared? I am pleased to invite you to 2nd Annual Security event on Dec 5, 2017, in our offices in Fishkill. This year’s event will feature actual hands-on experiences […]
I have been talking over the past year about “Hardening Active Directory”. In those discussions, we have been talking about implementing a granular password policy so that you K-2 students have a lower password requirement than your financial and guidance users.
Welcome to the second installment of, “Weekly Tech Tidbits”. This week I am going to answer a very common question, “Why do we have to remove local Administrator rights to workstations?” The answer is quite simple. Almost every single attack on your network begins on a workstation.
Welcome to the inaugural edition of CSI’s “Your Weekly Tech Tidbit”. Building on Scott’s ever popular Tech Tidbits portion of our quarterly Tech Talk / SYSOP meetings, each week either Scott or I will be sharing a timely thought for the week based upon what we see happening in IT that is of relevance to […]
Reuters reports, “A bill proposed in Congress on Wednesday would require the U.S. National Security Agency to inform representatives of other government agencies about security holes it finds in software like the one that allowed last week’s “ransomware” attacks.
Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan.