So, for some time now, having an RDP port open to the web would probably mean trouble for you. A number of reasons you would not want to open that port up include being able to brute force the administrator account. Even if it has been renamed, it is not guaranteed to stop an attacker. […]
Microsoft can send samples of software from your PC using the Automatic Sample submission feature in Windows Defender. This would mean that even software that you develop or test will be pushed to their servers. Developers need to ask themselves if this is ok or not and turn off this feature in Windows 10. The […]
I’m sure both Google and Apple take security seriously when it comes to their mobile OS. But I actually place my trust in Apple over Google because Apple is the creator of the device and the OS. With that said they don’t allow people to look at their source code. Apple also does a pretty […]
Hello from the farm. Please take note of this document when building a small business IT environment.
If you are an Apple user please be aware of where you get your lightning cable from. Don’t borrow one from someone. Don’t accept or purchase a cable that doesn’t come from Apple directly. A hacker has modified a Lightning cable in order to gain remote access to your device. I believe it works via […]
If you are thinking about information security within the context of your small business environment, please consider attending this webinar: Click Here Stay safe online!
If you run Chrome or Firefox or any other of the popular browsers you can do a few things to the settings in order to keep your data a little more private. I’m talking more specifically about Google Chrome right now, but the same concept applies to all. Here’s some settings to look for: Turn […]
Redirecting my efforts toward a CEH cert instead of a CISSP. CEH is more of what I’m looking for in terms of technical level. It’s a nice complement to my formal education and years in the field. Learn more in this video
Please read this guide for context. I love the attempt here to outline a simple strategy for defending technology assets. I will take what the Australian Government has laid out here and build upon it as it is a good foundation. Sometimes, it seems a nearly impossible task, but with the right energy focused on the right target, you’ll […]
Many people are looking for a place to put their data and keep it private. Or not private, in some cases. What can you do to ensure highest security standards are in place and your data is protected from bad actors? Previously, I wrote a document covering some basic cyber security guidelines for the average […]