Christopher McNaughton

Application Whitelisting – Information Security Essentials

Application Whitelisting Application Whitelisting is a means to limit the number of programs running in your business environment that can…

4 years ago

Multi Factor Authentication – Information Security Essentials

Multi Factor Authentication Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order…

4 years ago

User Application Hardening – Information Security Essentials

User Application Hardening While useful for many business operations, applications like Flash, Java, Adobe Acrobat and certain features in Microsoft…

4 years ago

Restricting Administrator Privileges – Information Security Essentials

Restricting Administrator Privileges Restricting administrative privileges makes it difficult for to spread malware and malicious code inside your network. In…

4 years ago

Operating System Patching – Information Security Essentials

Operating System Patching Operating System (OS) patching refers to applying updates to operating systems. It is absolutely critical for ensuring…

4 years ago

Disabling Local Administrator Accounts – Information Security Essentials

Disabling Local Administrator Accounts The Administrator account (NT AUTHORITYAdministrator) exists by default on all Microsoft Windows (Windows NT-based) systems and…

4 years ago

Backing Up – Information Security Essentials

Backing Up The concept behind backups is simple: Make a copy of your files and configurations and place them on…

4 years ago

Security Overview – Information Security Essentials

    SECURITY OVERVIEW This guide is an overview of security measures all organisations can do to best protect themselves…

4 years ago

Office 365 Health Check

SECMON1 Office 365 Health Check  fice 65 The SECMON1 Team frequently encounter implementations of Office 365 where some of the…

4 years ago

Preventing Office 365 data breaches

Ask yourself these critical questions Has your organisation migrated to Office 365?   Was the implementation reviewed by security specialists?…

4 years ago