Search

Tag: cybersecurity

View:
Brandon Lee
  • Brandon Lee
  • September 14, 2021

Windows Server 2022 New Features

Well, it’s finally here: starting September 1, 2021, Windows Server 2022 is generally available! There’s a whole slew of new features and novelties present in the OS. However, most advancement is seen in enhancing security and hybrid cloud workload, catering to the modern shift to remote work and processing data at the point of inception.
Read more
Benoit Voirin
  • Benoit Voirin
  • June 24, 2021

How to Increase Security in Remote Work Conditions Using Mobile Device Management

Having unmanaged remote endpoints, overall, and in remote work specifically, can lead to unauthorized data access, data leakage, or even worse security compromise cases. Mobile Device Management solutions will allow you to tailor security policies, push security policies, settings and software on your employee remote-access devices, and identify potential vulnerabilities.
Read more
Benoit Voirin
  • Benoit Voirin
  • March 2, 2021

Assessing Your Active Directory

Evaluating the state of your Active Directory (AD) is perceived as a laborious and complex task. If you do that manually, then perhaps it is. However, checking up on the state of your AD is necessary to rule out potential threats to your environment. Luckily, there’s one tool that can help you generate a comprehensive security report on your chosen AD within minutes.
Read more
Benoit Voirin
  • Benoit Voirin
  • August 13, 2020

Email and Web Browser protection

If your browsers and email aren’t secured properly, then your network and users aren’t either. Properly securing your organization’s daily browsing activity can hinder the majority of cybersecurity compromisation cases. Issues like filtering, sender policy framework (SPF), browser types and browsing limitations are all detrimental.
Read more
Benoit Voirin
  • Benoit Voirin
  • February 18, 2020

Cyber Security – Where to Start – Part 3

In the previous parts, we talked about general cybersecurity boundaries and staff education on the topic. The third crucial aspect is preparation, which allows minimizing the aftermaths if a cyber-attack does happen. Backups and crisis planning are two key activities that you have to manage so that you can effectively recover in case your cybersecurity is compromised.
Read more
Benoit Voirin
  • Benoit Voirin
  • November 28, 2019

Cyber Security – Where to Start – Part 2

If the previous part, you read about general boundaries of cybersecurity and why it’s mandatory to uphold. Continuing the topic, the initial steps to ensuring your business is cyber-secure, you need to create a solid foundation. Baseline OS security tools have to be configured and active 24/7, and much success of cybersecurity depends on educating your staff.
Read more
Benoit Voirin
  • Benoit Voirin
  • September 24, 2019

Cyber Security – Where to start – Part 1

Nowadays it’s quite trendy to have penetration testing as a starting point for cybersecurity. Even though penetration testing is a good practice, it’s very limited and focused on one application/product and should therefore not be used as an entry point for cybersecurity.
Read more