A digital hub marked with crossed wrench and screwdriver branches circuits through a system.
mobile banking / financial network security / secure transactions/  bank card / credit card


How to securely manage LAPS on a Windows network

Microsoft’s Local Administrator Password Solution (LAPS) enables local admin passwords to be set, reset and validated periodically. Here is how to make the best use of LAPS.

Businessman looks for the malicious code of a virus

How to update your Windows driver blocklist to keep malicious drivers away

An investigation revealed that Microsoft’s malicious driver blocklist wasn’t updating as expected. Here’s how to make sure you’re not letting bad actors gain access to your system through these carefully crafted attack tools.

diverse group people collaborate using Post-It notes to strategize on a glass wall

How to conduct a tabletop exercise

Testing your security policies and procedures in real-life scenarios can help you improve your security posture—if you implement the lessons learned.

Microsoft > Excel [Office 365]

How to manage Microsoft's Excel and Office macro blocking

Microsoft's reversal of its blocking by default on Excel macros creates an opportunity to improve policies and processes around Excel and Office macro use.

binary cyberattack cybersecurity hacked protected

How to mitigate Active Directory attacks that use the KrbRelayUp toolset

Attackers are using the KrbRelayUp toolset to compromise Kerberos in on-premises Active Directory networks. This two-step process should protect you.

security audit - risk assessment - network analysis

How to audit Microsoft Active Directory

Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses.


How SAML works and enables single sign-on

Security assertion markup language (SAML) is an open standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

security internet network encryption privacy padlock

What is SSL? How SSL certificates enable encrypted communication

SSL and its descendent, TLS, are protocols that encrypt internet traffic, making secure internet communication and ecommerce possible.

CSO  >  malware / virus / security threat / protective antivirus shield

How to prevent sideloading attacks in Windows and Office 365

A few settings in Windows or Office 365 can help stop users from installing malicious apps on their devices.

youtube thumbnails template 021020

Microsoft Defender for Business | What security admins need to know

The new Microsoft Defender for Business makes important Windows security features more available to small businesses.

Antivirus / virus alert / warning / security threats / protection from attack

How to configure Microsoft Defender for cloud-based attacks

Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

youtube thumbnails template 021020

Reviewing software risks on your Windows network

Set aside some time to inventory and analyze the software and settings on your network to identify risks.

youtube thumbnails template 021020

How to mitigate the Microsoft MSHTML remote code execution zero-day

A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.

youtube thumbnails template 021020

How SMBs should select a security-savvy managed service provider

SMBs typically outsource some or all their IT services to an MSP. Here’s how to find one that takes security seriously.

youtube thumbnails template 021020 2

How to improve Windows 10 security on PCs that can’t run Windows 11

Most businesses will have some PCs that they can’t update to Windows 11. Here’s how to keep those PCs from being a security weak link.

youtube thumbnails template 021020

What Windows admins need to know about computer forensics

Understand these basic elements of computer forensics before you have to review log data for suspicious activity.

youtube thumbnails template 021020

Best Windows network hardening advice from MITRE D3FEND

The new MITRE D3FEND knowledge graph of cybersecurity countermeasures offers solid guidance for Windows admins.

Load More