AA22-047A: Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology

Posted on Wednesday February 16, 2022

date: February 16, 2022

Summary

Actions to Help Protect Against Russian State-Sponsored Malicious Cyber Activity:
• Enforce multifactor authentication.
• Enforce strong, unique passwords.
• Enable M365 Unified Audit Logs.
• Implement endpoint detection and response tools.

 

Laptops vs. desktops: Which should your small business use?

Posted on Monday February 14, 2022

When purchasing computers for your small business, one of the biggest decisions you’ll have to make is whether to get desktops or laptops. The choice ultimately depends on five factors, which we’ve outlined for you below.

 

Keep callers on the line by using these VoIP features

Posted on Friday February 11, 2022

Callers generally don’t like being put on hold for very long periods. But sometimes, your staff will have to put them on hold to verify their identity, find answers to their queries, or refer the call to a supervisor. One way to make sure callers do not feel abandoned while on hold is to use certain Voice over Internet Protocol (VoIP) features.

 

Researcher Spotlight: Cyber Viking Nate Warfield is Here to Help

Posted on Friday February 11, 2022

“There are few jobs where I can say, I make two billion people more secure on the internet every single day.” Childhood Look: Goth kid, all in black Current Look: Cyber Viking Childhood hobby: Head banging to Metallica, Marilyn Manson, and Guns N’ Roses Current hobby: n0x08 DJ’s Live events around the world. Check him…

 

Microsoft 365 Apps admin center: Features you need to know

Posted on Wednesday February 09, 2022

Migrating workflows to the cloud, securing all company devices and software, and ensuring 24/7 data access are gargantuan IT admin tasks, especially as companies adopt flexible working arrangements post-COVID-19. Fortunately for Microsoft 365 Apps users, the admin center offers features that empower IT personnel to be more efficient and effective in handling these crucial responsibilities.

 

AA22-040A: 2021 Trends Show Increased Globalized Threat of Ransomware

Posted on Wednesday February 09, 2022

date: February 9, 2022 | Last revised: February 10, 2022

Summary

Immediate Actions You Can Take Now to Protect Against Ransomware: • Update your operating system and software.
• Implement user training and phishing exercises to raise awareness about the risk of suspicious links and attachments.
• If you use Remote Desktop Protocol (RDP), secure and monitor it.
• Make an offline backup of your data.
• Use multifactor authentication (MFA).

 

Page:   1...707172737475767778...353

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016