Free Advice

LARGE INCREASE IN COVID-19 THEMED MALICIOUS CYBER ACTIVITY

How to protect your self when working remotely There have been many reports of an increase in cyber-attacks on remote…

5 years ago

Application Patching – Information Security Essentials

Application Patching Application patching refers to applying updates to software applications. It is absolutely critical for ensuring system security and…

5 years ago

Configuring Macro Settings – Information Security Essentials

Configuring Macro Settings Disabling or limiting Microsoft Office macros can aid in preventing malicious code from entering your organisation's network.…

5 years ago

Application Whitelisting – Information Security Essentials

Application Whitelisting Application Whitelisting is a means to limit the number of programs running in your business environment that can…

5 years ago

Multi Factor Authentication – Information Security Essentials

Multi Factor Authentication Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order…

5 years ago

User Application Hardening – Information Security Essentials

User Application Hardening While useful for many business operations, applications like Flash, Java, Adobe Acrobat and certain features in Microsoft…

5 years ago

Restricting Administrator Privileges – Information Security Essentials

Restricting Administrator Privileges Restricting administrative privileges makes it difficult for to spread malware and malicious code inside your network. In…

5 years ago

Operating System Patching – Information Security Essentials

Operating System Patching Operating System (OS) patching refers to applying updates to operating systems. It is absolutely critical for ensuring…

5 years ago

Disabling Local Administrator Accounts – Information Security Essentials

Disabling Local Administrator Accounts The Administrator account (NT AUTHORITYAdministrator) exists by default on all Microsoft Windows (Windows NT-based) systems and…

5 years ago

Backing Up – Information Security Essentials

Backing Up The concept behind backups is simple: Make a copy of your files and configurations and place them on…

5 years ago