How-Tos

youtube thumbnails template 021020
video

How to harden your web browser against cloud-based threats

The web browser is now the portal that most employees use to access data and apps. These tips will help prevent attackers from exploiting it.

youtube thumbnails template 021020 2
video

Microsoft changes its security update guide: What you need to know

Microsoft has updated its Common Vulnerability Scoring System. Here’s a walk-through the changes.

new solarwinds thumb
video

Tips for finding signs of SolarWinds-type attacks in Active Directory

The SolarWinds attackers used sophisticated techniques to steal admin credentials. Here’s what to look for in AD.

youtube thumbnails template 021020
video

Tips for conducting effective phishing simulations

Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.

youtube thumbnails template 021020
video

Top SolarWinds resources for security admins

Vendors and government agencies are making information and tools available to detect and prevent attacks like SolarWinds.

youtube thumbnails template 021020
video

How to mitigate risk from nation-state attacks

The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.

youtube thumbnails template 021020
video

How to block malicious JavaScript files in Windows environments

Attackers use malicious JavaScript files masquerading as legitimate updates to execute ransomware and other malware attacks. These simple steps will stop them.

youtube thumbnails template 021020
video

How Azure customers can prevent subdomain takeover

Organizations commonly leave openings for attackers to take control of subdomains set up in Azure. These tips will block them from doing so.

youtube thumbnails template 021020
video

How to prevent business email compromise in Microsoft 365

BEC campaigns are finding clever ways to bypass some protections. Use this advice to tighten up controls to keep malicious emails from getting through in Microsoft 365.

youtube thumbnails template 021020
video

How to prevent credential theft in Windows networks

Attackers covet credentials, and Windows admins sometimes make it too easy for them. Here’s how to harden Windows networks against credential theft.

A conceptual representation of accessing username and password credentials.

4 Windows 10 settings to prevent credential theft

Review these Windows settings to make sure you're not making it easy for attackers to steal login credentials.

youtube thumbnails template 021020
video

How to keep attackers from using Active Directory against you

Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.

Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

How to use Windows Defender Attack Surface Reduction rules

With Microsoft's Attack Surface Reduction, you can set rules to block risky actions for each workstation on your network.

youtube thumbnails template 021020
video

How to use Attack Surface Reduction Rules in Windows 10

These new rules, part of Windows Defender, can help prevent damage from phishing and other attacks.

youtube thumbnails template 021020
video

7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Ransomware perpetrators count on Windows security admins to make these common mistakes. Here’s how to find and fix them.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

How to take better control of applications running on your network

Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.

youtube thumbnails template 021020
video

How to limit which applications can run on your Windows network

Windows 10 S Mode allows you to whitelist approved applications and block unauthorized applications from running on your network.

youtube thumbnails template 021020
video

New Windows vulnerabilities underscore importance of network segmentation

The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.

cssg 079 thumb
video

Windows 10 security: Are you on the right version?

With some versions of Windows 10 off support or going off support soon, it’s time to review what security features you’re missing if you haven’t updated recently. Follow along here with the full Microsoft Ignite presentation,...

cssg 078 thumb
video

The four pillars of Windows network security

Multi-factor authentication, strong patch management, device control, and adherence to security benchmarks go a long way to protecting your Windows network.

Load More