How-Tos

security risk - phishing / malware / social engineering
security school education binary code classroom by skynesher getty

youtube thumbnails template 021020
video

How the COVID-19 crisis impacts Windows security

Microsoft and Google are pausing Windows and Chrome updates, and Microsoft is offering remote access technology and advice.

covid 19 coronavirus global pandemic by smartboy10 getty images binary tunnel by robertiez gettyima

Don’t let the coronavirus make you a home office security risk

Congratulations. You're now the chief security officer of your company’s newest branch office: Your home. Here's how to manage your new job.

youtube thumbnails template
video

Security considerations for remote workers

Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.

A hacker attacks from within a Windows system.

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute.

youtube thumbnails template 021020
video

How to defend Windows 10 from itself

Attackers are using tools and features built into Windows 10 to compromise systems and avoid detection. These tips will help shut them out.

youtube thumbnails template 021020
video

Installing Python on Windows 10 side-by-side with an existing version

How to install new versions of Python on Windows side-by-side with older versions.

youtube thumbnails template 021020
video

How to manage and secure administrator accounts

Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.

Scripting code displays on a laptop in a dark room.

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.

youtube thumbnails template 021020
video

How to fight scripting attacks

Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.

CSO > global security

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP).

ifcr 043 thumb
video

How to add color to your ggplot2 text in R

See how to style your headlines, axis text, and more in your ggplot graphs with the R ggtext package. Download the data from Sharon's associated article:...

youtube thumbnails template 021020
video

How to prevent data loss on your network

Use these tools and techniques to protect important data from being exfiltrated from your Windows network.

nwht 052 ls
video

How to use the ls command: 2-Minute Linux Tips

In this Linux tip, learn how to use the ls command. The ls command is one of the most basic commands. It’s used to list files and it has some very useful options.

DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

Windows security and protection [Windows logo/locks]

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.

youtube thumbnails template
video

How cyber attackers hide malware on your network

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.

youtube thumbnails template 021020
video

What is Python?

Learn about the hottest programming language around -- what it can do for you, what it’s best for, and when it’s not a good choice.

User ID + password / credentials / authentication

5 steps to avoid credential dumping attacks

Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks.

Load More