The ACSC Essential Eight Maturity model was developed by the Australian Cyber Security Center (ACSC) in an effort to fight against cybercriminals and malicious malware. The ACSC developed a series of prioritized mitigation strategies, called the ACSC Essential Eight Maturity Model, to help organizations mitigate the severity of security incidents by various cyber threats. These […]
Read More… from Achieve ACSC Essential Eight Risk Mitigation with PolicyPak
The NIST SP 800-171 mandate lists fourteen security controls that must be addressed in order to safeguard covered contractor information systems. Many companies are having to deal with an increasing number of data regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA). These regulations were created to protect […]
Read More… from NIST 800-171: How PolicyPak Helps You Meet Compliance
Last month, Microsoft issued a security warning concerning a drive-by attack that targets Chrome, Edge, and Firefox users. It’s called Adrozek. While it is technically referred to as a browser hijacker or browser modifier, in reality, it is drive-by malware. Adrozek was first discovered back in May of 2020 and by August was infecting more […]
Read More… from Block Adrozek Browser Malware Securely
HIPAA Changes for 2021 are critical for ensuring patient data is secure and protected. HIPAA is probably the most well-known cybersecurity compliance regulation in the U.S. It was originally written as a set of minimum standards for those organizations that fall under its jurisdiction. But while other major cybersecurity regulatory sets such as the General […]
Read More… from HIPAA Changes 2021: Three Ways to Secure Patient Data
A lot of times people ask me: “Jeremy, when I use ADMX files, I find that it seems to work for a while, then just ‘stop’ working. Have you seen this?” Or, another way people ask me is: “I want to ensure my users settings are locked down, so I created an ADMX file. But […]
Read More… from Group Policy ADM/X: Myths and Facts – What Microsoft Never Told you (and you need to know)
The last several days I decided to spin up Microsoft’s VDI solution which is greatly improved on Server 2012. The goal was to show how PolicyPak can deliver, lockdown and enforce application settings within Microsoft’s VDI. I knew it could — I just wanted to make my own video about it. The final video is […]
Read More… from Microsoft Server 2012 VDI and PolicyPak (or, lessons learned when shooting the video)
When I sat down to consider my 2019 IT predictions, it will be no surprise that I started with malware and ended with the cloud. They cover multiple areas of enterprise technology, with an emphasis on security and management. 42019 IT Predictions #1: Cryptomining Malware Continues4 Cryptocurrency was a major topic in 2018 on a […]
Read More… from Top 2019 IT Predictions for Security and Management
Oracle Java License Change: Everything You Need to Know The Oracle Java license change has become a hot topic amongst information technology professionals. As of January 2019, administrators who install Java 8 U 202 and later are only able to get security updates when they purchase support for each desktop. Furthermore, Java 11 and above […]
Read More… from Oracle Java License Change: Everything You Need to Know
Coronavirus is challenging our world, our governments and our communities. The circumstances it creates doesn’t have to challenge your enterprise however. Like many organizations, you have probably enacted a remote work policy. While it may seem like a daunting task to protect so many of your users that once resided on premise, it doesn’t have […]
Read More… from Secure Remote Work Environments Long after Coronavirus is Gone
What is Windows Update Delivery Optimization (WUDO)? Released as new feature in Windows 10 Windows Update Delivery Optimization enables you to download Updates and Apps from other computers that have already downloaded the update or app you are looking for. This is designed to help speed up updates and app delivery as a data can […]
Read More… from Using all your Bandwidth (in a Good Way) with Windows Update Delivery Optimization (WUDO)