logo
June 12, 2020 | Ryan Brooks

10 Security Tips for Malware Prevention

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to: Protect sensitive information and critical...
November 21, 2018 | Ryan Brooks

Securing Your Servers with Windows Defender, AppLocker, SCT and More

Malware — computer viruses, worms, Trojan horses, ransomware, spyware and so one — is a continuous threat to organizations because it can damage devices and enable unauthorized parties to access the network remotely to collect and transmit sensitive information. Windows Server 2016 includes the...
October 17, 2018 | Jeff Melnick

Top 7 Free Security Tools for IT Admins

It’s free, master Jedi! We've gathered top 7 security freeware tools for sysadmins. These tools are supposed to help you make your job easier and troubleshoot security issues faster.  1. Netwrix Auditor for Active Directory. Free Community Edition This freeware from Netwrix provides...
March 27, 2019 | John O'Neill Sr.

Stopping Skeleton Key Malware from Causing Data Breaches

Proving the old adage that “criminals never sleep,” a new piece of malware is making headlines. The aptly named Skeleton Key malware, detected in mid-January, bypasses the password authentication protection of Active Directory. Just as skeleton keys from the last century unlocked any door in a...
May 29, 2019 | John O'Neill Sr.

5 Steps for Protection against Wiper Malware

Significant security threats emerged in 2014. Closing out this epic year with a bang is Destover, aka Wiper. Wiper, as far as security threats go, is significant. Significant enough that the FBI quietly sent a memo to businesses and government agencies advising vigilance against Wiper based...
October 28, 2019 | John O'Neill Sr.

Preventing the Next Threat

IT security is as old as IT itself. That said, simply relying on the strategies of yesterday isn’t enough to combat modern threats. Case in point: over the past year we’ve witnessed two of the largest and most effective IT security breaches ever; Heartbleed and the Target breach. The most...
...