How-Tos

youtube thumbnails template 021020
video

How to set up email security rules in Microsoft Office 365

Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.

youtube thumbnails template 021020
video

Top vulnerabilities used in attacks on Windows networks in 2020

COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.

youtube thumbnails template 021020
video

How to tweak Windows logs to better investigate attacks

Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.

youtube thumbnails template 021020
video

How to secure printers on Windows networks

Attackers often gain access to networks through the printers connected to them. Here’s how to address printer vulnerabilities on your network.

smishingthumb
video

What is smishing? How phishing via text message works

Don't let the cute name fool you, smishing (a portmanteau of 'SMS' and 'phishing') is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.

youtube thumbnails template 021020
video

How to deploy secure Windows computing resources remotely

As remote work becomes more prevalent and, likely, permanent, you need secure deployment processes in place for devices connecting to Windows networks.

youtube thumbnails template 021020
video

What you need to know about SSL certificates and Windows networks

SSL is not just a web protocol. Applications use it, too. Here’s advice to manage SSL certificate protocols on a Windows network.

youtube thumbnails template 021020
video

How to protect your Windows network login credentials

Recent hacks show that attackers will search for network login credentials in many ways. Make them harder to get.

vishingthumb2
video

What is vishing? Understanding this high-tech phone scam

Vishing (short for voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone. While that makes it sound like an old-fashioned scam, vishing attacks have high-tech...

youtube thumbnails template 021020
video

How to perform Windows security updates remotely

Follow these best practices to make sure all your remotely located Windows devices have the latest security updates.

youtube thumbnails template 021020
video

Best practices for secure work-from-home VPN connections

As more employees work from home, it’s important to review your VPN settings and following the best guidance.

youtube thumbnails template 021020
video

How to protect Windows administrator accounts

Compromising windows administrator accounts is always a key goal for attackers. You can help prevent that from happening with these best practices.

youtube thumbnails template 021020
video

How to protect a Windows network from ransomware

As the recent attack on Honda shows, anyone can be a victim of a ransomware attack. This advice will minimize your risk.

youtube thumbnails template 021020
video

How to protect legacy systems on a Windows network

Every company has legacy systems, many of which provide vulnerabilities for attackers to exploit. Use this advice to help shut them out.

youtube thumbnails template 021020
video

How to maximize Windows Firewall

Companies that have disabled Windows Firewall might be missing out on some added network protection. Here’s how to set it up effectively.

youtube thumbnails template 021020
video

Guide to key Windows 10 event logs you need to monitor

These are the event logs that will help you identify malicious activity on your network.

youtube thumbnails template 021020
video

What security admins need to know about the new Microsoft 365 patching channel

Microsoft has rebranded and updated its tool to deploy security patches and new features.

youtube thumbnails template 021020
video

Why attackers can still exploit a MS Office vulnerability patched in 2012

Attackers still commonly use a vulnerability in older versions of Microsoft Office because many organizations left it unpatched. Did yours?

youtube thumbnails template 021020
video

How to use Microsoft’s Sysmon and Azure Sentinel logging tools

Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.

youtube thumbnails template 021020
video

Microsoft 365 security recommendations and defaults: What you need to know

COVID-related attacks make it more important that you follow Microsoft’s advice to protect Microsoft 365 users and systems.

Load More