How-Tos

spear fishing

How to defend Office 365 from spear-phishing attacks

A recent successful zero-day Flash attack began with a spear-phishing email. These Windows 10 and Office 365 settings could have prevented it.

thumb
video

How to defend Office 365 from spear-phishing attacks

Configure Office 365 to detect email-delivered malware.

thumb
video

R tip: Write your own RStudio addins

This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE

thumb
video

How to set up security in Office 365 to CIS recommendations

Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.

security audit - risk assessment - network analysis

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled.

thumn
video

R tip: Creating color-coded calendars

See how well you’re achieving daily goals with a color-coded calendar made in R

thumbnail
video

How to enable and configure Office 365 logging and auditing

Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.

thumb
video

How to find Windows security setup resources

Find security scripts, compliance and other Windows resources.

Computerworld Cheat Sheet - Microsoft Outlook 2016

How to set Microsoft Office 365 ATP policies to block malicious URLs

Windows Advanced Threat Protection allows admins to set link filters for email messages and attachments in Outlook.

bucket with holes breach security vulnerability

How to set up data loss prevention rules in Microsoft Office 365

Most data leakage occurs via emai. Set Office 365 DLP policies to stop sensitive data from leaving your organization.

thumbnail
video

Preventing data leakage in Windows

Set data loss prevention policies in Windows 10 to prevent data leakage.

secure two-step authentication via laptop and mobile phone

How to set up multifactor authentication for Office 365 users

Requiring MFA for some or all Microsoft Office 365 users will better protect your network and email system from attacks.

thumbnail
video

Preventing malicious links in Windows

Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

How to set up multi-factor authentication in Microsoft Office 365

Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.

email security risk - phishing / malware

How to stop malicious email forwarding in Outlook

Microsoft Office 365 administrators can use these settings to find and delete hidden rules attackers use to intercept Outlook email messages.

thumbnail
video

Avoid malicious Outlook email forwarding

Set up Office 365 to defend against hackers who use hidden Outlook rules to forward emails.

thumbnail
video

How to use Windows Delivery Optimization

Allow devices to share and distribute updates across a network without having to rely on Windows Software Update Services.

security internet network encryption privacy padlock

What is SSL, TLS? And how this encryption protocol works

The SSL/TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

update arrows in motion amid circuits

How to use Windows Update Delivery Optimization to distribute updates across your network

These are the Delivery Optimization settings you need to know to deliver feature and security updates without using Windows Software Update Services.

Load More