How-Tos


CSO > colleagues writing on a glass wall / collaboration / teamwork

Peer product reviews: IT pros evaluate 7 enterprises offerings

These downloadable reports offer objective user-contributed product evaluations to help IT decision-makers navigate the tech purchase process.

browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.

cssg 032 thumb
video

How to harden web browsers against cyberattacks

Use these techniques to limit attackers’ ability to compromise systems and websites.

online certification mortar board graduate student study certificate  by pettycon pixabay and janjf

Earn your IoT security certification

Insider Pro is teaming up with CertNexus to offer subscribers access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.

nwht 042 thumb
video

How to use the screen command: 2-Minute Linux Tips

In this Linux tip, learn how to use the screen command. It's a command that allows you to detach an SSH session and then reconnect to it.

ifcr 036 thumb
video

R data.table in 5 minutes

Get a quick look at the R data.table package in this 5-minute tutorial that gives a sample of the package’s speed and power.

ON-OFF  >  Pressing a power switch.

How to disable LLMNR in Windows Server

Link-Local Multicast Name Resolution is usually not needed in modern networks and leaves the door open to man-in-the-middle attacks. Here's how to shut it off.

cssg 031 thumb
video

How to and why you should disable LLMNR with Windows Server

Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019.

nwht 041 thumb
video

How to use the tee command: 2-Minute Linux Tips

In this Linux tip, learn how to use the tee command. It’s a very simple command that allows you to run some other command and send its output both to the screen and to a file at the same time.

A businessman interacts with a Microsoft-colored shield protecting network users + user groups.

How to audit permissions after a Windows migration

As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.

cssg 030 thumb
video

How to double-check permissions post migration from Windows 7

It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check.

nwht 040 thumb
video

How to use the who command: 2-Minute Linux Tips

In this Linux tip, learn how to use the who command. It will show you details regarding who is logged in and about the system.

cwht 012 thumb
video

The best office apps for Android

Your Android phone can help you stay productive on the go — if you have the right apps to get the job done.

cssg 029 thumb
video

Microsoft’s Windows, Office 365 advice for secure elections

Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems.

mockup
video

Useful Google apps you aren't using

Gmail, Google Calendar, Google Drive — we all know the main titles. But if you're only using the obvious ones, you're missing out. Google's got some great stuff out there that's under the radar and all too easy to miss.

cssg 028 thumb
video

Top enterprise VPN vulnerabilities

Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

Lock + key securing abstract data with a Windows logo overlay.

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.

Load More