How to secure your domain name services
Follow these steps to protect your websites at the server and workstation. READ MORE HERE…
Follow these steps to protect your websites at the server and workstation. READ MORE HERE…
Make your own disaster checklist and recovery toolkit before trouble happens. READ MORE HERE…
Use these techniques to limit attackers’ ability to compromise systems and websites. READ MORE HERE…
Link-Local Multicast Name Resolution could enable a man-in-the-middle attack, so it’s best to disable the protocol when setting up Windows Server 2019. READ MORE HERE…
It pays to make sure all permissions in your Windows environment are correct after migrating from Windows 7 or Server 2008 R2. Here’s how to check. READ MORE HERE…
Microsoft has issued guidance and offered resources to help election officials and candidate campaigns to better protect their Windows and Office 365 systems. READ MORE HERE…
Don’t assume VPNs are always safe. These popular enterprise VPNs all have known remote code execution vulnerabilities. READ MORE HERE…
Bitlocker and self-encrypting hard drives can make it easier to erase data so that it cannot be recovered. This is how the “crypto-erase” method works. READ MORE HERE…
Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers. READ MORE HERE…
Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it. READ MORE HERE…