How-Tos

youtube thumbnails template 021020
video

Tips for conducting effective phishing simulations

Poorly executed phishing simulations can send the wrong message to employees. Here’s how to do it right.

youtube thumbnails template 021020
video

Top SolarWinds resources for security admins

Vendors and government agencies are making information and tools available to detect and prevent attacks like SolarWinds.

youtube thumbnails template 021020
video

How to mitigate risk from nation-state attacks

The recent SolarWinds attack underscores the danger many companies face from nation-state actors. Here’s how to prepare your Windows networks from the threat.

youtube thumbnails template 021020
video

How to block malicious JavaScript files in Windows environments

Attackers use malicious JavaScript files masquerading as legitimate updates to execute ransomware and other malware attacks. These simple steps will stop them.

youtube thumbnails template 021020
video

How Azure customers can prevent subdomain takeover

Organizations commonly leave openings for attackers to take control of subdomains set up in Azure. These tips will block them from doing so.

youtube thumbnails template 021020
video

How to prevent business email compromise in Microsoft 365

BEC campaigns are finding clever ways to bypass some protections. Use this advice to tighten up controls to keep malicious emails from getting through in Microsoft 365.

youtube thumbnails template 021020
video

How to prevent credential theft in Windows networks

Attackers covet credentials, and Windows admins sometimes make it too easy for them. Here’s how to harden Windows networks against credential theft.

youtube thumbnails template 021020
video

How to keep attackers from using Active Directory against you

Criminals will try to change Windows Active Directory Group Policy security settings to enable attacks. Here’s how to stop them.

youtube thumbnails template 021020
video

How to use Attack Surface Reduction Rules in Windows 10

These new rules, part of Windows Defender, can help prevent damage from phishing and other attacks.

youtube thumbnails template 021020
video

7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Ransomware perpetrators count on Windows security admins to make these common mistakes. Here’s how to find and fix them.

youtube thumbnails template 021020
video

How to limit which applications can run on your Windows network

Windows 10 S Mode allows you to whitelist approved applications and block unauthorized applications from running on your network.

youtube thumbnails template 021020
video

New Windows vulnerabilities underscore importance of network segmentation

The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.

cssg 079 thumb
video

Windows 10 security: Are you on the right version?

With some versions of Windows 10 off support or going off support soon, it’s time to review what security features you’re missing if you haven’t updated recently. Follow along here with the full Microsoft Ignite presentation,...

cssg 078 thumb
video

The four pillars of Windows network security

Multi-factor authentication, strong patch management, device control, and adherence to security benchmarks go a long way to protecting your Windows network.

cssg 077 thumb
video

What you need to know about Microsoft Azure Security Benchmarks 2.0

Microsoft has provided new guidance in the form of benchmarks to make sure your Azure environment is secure.

youtube thumbnails template 021020
video

How to securely prepare for Adobe Flash end of life on Windows 10

Microsoft will soon discontinue support for Adobe Flash. Here’s how to transition to secure alternatives while blocking unsafe use of Flash.

youtube thumbnails template 021020
video

How to patch the Zerologon vulnerability in Windows Netlogon Remote Protocol

The Zerologon flaw could give attackers domain admin privileges. Here’s how the two-step patching process to fix it works.

youtube thumbnails template 021020
video

Tips to prep Windows networks for proper incident forensics

If a security incident occurs on your Windows network, are you prepared to do a thorough investigation? These tips and tools will help.

youtube thumbnails template 021020
video

How to set up email security rules in Microsoft Office 365

Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.

youtube thumbnails template 021020
video

Top vulnerabilities used in attacks on Windows networks in 2020

COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.

Load More