Data Breach

User Application Hardening – Information Security Essentials

User Application Hardening While useful for many business operations, applications like Flash, Java, Adobe Acrobat and certain features in Microsoft…

5 years ago

Restricting Administrator Privileges – Information Security Essentials

Restricting Administrator Privileges Restricting administrative privileges makes it difficult for to spread malware and malicious code inside your network. In…

5 years ago

Operating System Patching – Information Security Essentials

Operating System Patching Operating System (OS) patching refers to applying updates to operating systems. It is absolutely critical for ensuring…

5 years ago

Disabling Local Administrator Accounts – Information Security Essentials

Disabling Local Administrator Accounts The Administrator account (NT AUTHORITYAdministrator) exists by default on all Microsoft Windows (Windows NT-based) systems and…

5 years ago

Backing Up – Information Security Essentials

Backing Up The concept behind backups is simple: Make a copy of your files and configurations and place them on…

5 years ago

Security Overview – Information Security Essentials

    SECURITY OVERVIEW This guide is an overview of security measures all organisations can do to best protect themselves…

5 years ago

Office 365 Health Check

SECMON1 Office 365 Health Check  fice 65 The SECMON1 Team frequently encounter implementations of Office 365 where some of the…

5 years ago

Preventing Office 365 data breaches

Ask yourself these critical questions Has your organisation migrated to Office 365?   Was the implementation reviewed by security specialists?…

5 years ago

COVID-19 & Working from home – Mitigate the security risks

As COVID-19 infections increase globally there has been a vast increase in the numbers of staff working from home. Many…

5 years ago