How-Tos

Credential theft  > A thief steals a password.

cssg 025 thumb
video

How to monitor Windows to prevent credential theft attacks

Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it.

nwht 037 thumb
video

How to use the sudo command: 2-Minute Linux Tips

Learn how to use the sudo command. It’s a very important command for Linux security because it provides a way for individual users to run specific commands with the authority of root.

Virtual security technology focuses on the Microsoft Teams logo as someone uses her mobile phone.

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams.

cssg 024 thumb
video

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams.

nwht 036 env
video

How to use the env command: 2-Minute Linux Tips

Learn how to use the env command. The most useful thing it does is to provide information on your shell environment when you’re working on the Linux command line.

'NO' symbol [circle-backslash] and raised hand against a background of passwords / passcodes

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server.

cssg 023 thumb
video

How to disable basic or legacy authentication to set up MFA in Office 365

Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.

ifcr 033 thumb
video

How to get API data with R

No R package for an API you’d like to use? No problem! See how to write your own R code to pull data from an API using API key authentication.

nwht 035 thumb
video

How to use the touch command: 2-Minute Linux Tips

In this Linux tip, learn how to use the touch command. It allows you to create an empty file or update a file’s last updated date/time settings.

CSO > Microsoft Azure backups / cloud computing / binary code / data transfer

7 steps to ensure your Azure backup works when you need it

Worried about ransomware attacks? The best thing you can do now is make sure your backup system is ready.

tools or toolkit surrounding a lightbulb on a chalkboard to build, develop or repair

How to build a startup evaluation toolkit

In the first installment of our startup evaluation guide, we cover five essential tools you need to ensure you are heading in the right direction.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it where possible. Here’s how.

cssg 022 thumb
video

How to avoid using RDP in Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.

nwht 034 thumb
video

How to use the wc command: 2-Minute Linux Tips

Learn the wc command. It provides an easy way to count the lines, words and characters in a file or in output from some other command.

Identity access management  >  abstract network connections and circuits reflected in eye

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.

youtube thumbnails template
video

R tip: How to use Git and GitHub with R projects

See how to use Git version control and sync with GitHub -- all right within RStudio

nwht 033 groups
video

How to use the groups command: 2-Minute Linux Tips

Learn how to use the groups command. It provides a list of the groups that a user is a member of by pulling information from the /etc/group and /etc/passwd files.

Microsoft's Chromium Edge browser

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

Load More