logo

Windows Server 2016 Containers

Windows Server 2016 introduces container technology to isolate applications, reduce attack surfaces, and improve scalability. Windows Server containers share the host OS kernel for lightweight process isolation, while Hyper-V containers add VM-level separation for enhanced security. With Docker integration and Nano Server support, containers streamline development and operations while enforcing least privilege and improving identity-driven … Continued

(ISC)² Certifications Compared: CISSP, SSCP, CCSP, CSSLP, CAP and HCISPP

Founded in 1989, (ISC)2 is a leading cybersecurity organization that  provides training, education and certifications for IT professionals and the organizations they support.  A non-profit organization, (ISC)2 boasts almost 140,000 members worldwide. offers a comprehensive program with six different certifications, including certifications geared to information security, healthcare security and risk management. Most certifications are geared … Continued

Microsoft Windows Server 2016 Security

You may have been following our series of blog posts on Microsoft Windows Server security features and capabilities for reducing risk in your IT infrastructure. Today, we’ve compiled a list of all these blog posts. You can use them in two ways as you work to secure your Windows Server operating system. First, of course, … Continued

Securing Your Servers with Windows Defender, AppLocker, SCT and More

Windows Server 2016 offers multiple tools to strengthen defenses against malware and unauthorized access. Windows Defender provides antivirus, firewall, and exploit protection, while Device Guard enforces application whitelisting with virtualization-based security. Control Flow Guard reduces memory corruption exploits, and administrators can limit software execution with SRPs and AppLocker. The Security Compliance Toolkit adds baseline policies … Continued

Ten Most Useful Office 365 PowerShell Commands

Using Windows PowerShell to manage Office 365 may seem odd at first. After all, cloud solutions promise simplicity and ease of use — adjectives rarely used in connection with Windows PowerShell. But bear with me. In this article, I’ll show you the ten most useful Office 365 PowerShell cmdlets for system administrators. Perhaps after reading … Continued

How to Add, Delete and Change Local Users and Groups with PowerShell

Managing local users and groups with PowerShell is streamlined through the Microsoft.PowerShell.LocalAccounts module, which provides cmdlets to create, modify, disable, or remove accounts and groups. Administrators can automate tasks such as adding users to groups, resetting passwords, or reviewing memberships, while also managing Microsoft and Azure AD-linked accounts. Remote management via PowerShell sessions further simplifies … Continued

What Are Windows Firewall and IPsec?

One key component in securing your IT infrastructure is protecting against network-related security threats. Windows Server offers several network security features to help: Download free guide: Microsoft Windows Server 2022  Windows Firewall with Advanced Security Windows Firewall with Advanced Security blocks unauthorized network traffic flowing into or out of a local device by providing host-based, … Continued

Compliance Rush: Five Mistakes that Can Screw Your Company

In April 2018, shortly before the GDPR came into force, IDC reported that only 29% of small businesses and 41% of midsize businesses in Europe had taken steps to prepare for the regulation. Now the GDPR has been around for some months, but many organizations are still struggling to meet their compliance obligations. One recent … Continued

Sysadmin under Fire: Get to the Boss

So you’ve had it with crappy software and are ready to ask your boss to increase the IT budget. Go for it!

File Server Security with FSRM, EFS and BitLocker

Organizations today store data in many places, including both the corporate file servers and users’ personal devices. To ensure both security and regulatory compliance, IT administrators need to tightly control access to data stored on file servers, and also protect data on portable devices to minimize the risk of data loss or exposure if the … Continued

What Is Elevation of Privilege and Why is it Significant?

Privilege escalation is a common tactic present in almost every cyberattack today. Malicious insiders, ransomware gangs and other threat actors often use it in combination with to lateral movement to traverse a victim’s network to gain unauthorized access to sensitive IT resources. Elevated access rights are vital for malicious activity, including stealing sensitive data, disrupting … Continued

Choosing the Right Security Certifications: CISSP vs CISM, CISA and CRISC

If you’re interested in pursuing a career in cybersecurity, then you’ve made a great choice! Skilled information security professionals are in high demand and are likely to remain so in the future, so the field offers solid financial benefits. According to the 2018 IT Skills and Salary Report from Global Knowledge, 41 percent of employers … Continued