Application Whitelisting – Information Security Essentials

5 years ago

Application Whitelisting Application Whitelisting is a means to limit the number of programs running in your business environment that can…

Multi Factor Authentication – Information Security Essentials

5 years ago

Multi Factor Authentication Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order…

User Application Hardening – Information Security Essentials

5 years ago

User Application Hardening While useful for many business operations, applications like Flash, Java, Adobe Acrobat and certain features in Microsoft…

Restricting Administrator Privileges – Information Security Essentials

5 years ago

Restricting Administrator Privileges Restricting administrative privileges makes it difficult for to spread malware and malicious code inside your network. In…

Operating System Patching – Information Security Essentials

5 years ago

Operating System Patching Operating System (OS) patching refers to applying updates to operating systems. It is absolutely critical for ensuring…

Disabling Local Administrator Accounts – Information Security Essentials

5 years ago

Disabling Local Administrator Accounts The Administrator account (NT AUTHORITYAdministrator) exists by default on all Microsoft Windows (Windows NT-based) systems and…

Backing Up – Information Security Essentials

5 years ago

Backing Up The concept behind backups is simple: Make a copy of your files and configurations and place them on…

Security Overview – Information Security Essentials

5 years ago

    SECURITY OVERVIEW This guide is an overview of security measures all organisations can do to best protect themselves…

Office 365 Health Check

5 years ago

SECMON1 Office 365 Health Check  fice 65 The SECMON1 Team frequently encounter implementations of Office 365 where some of the…

Preventing Office 365 data breaches

5 years ago

Ask yourself these critical questions Has your organisation migrated to Office 365?   Was the implementation reviewed by security specialists?…