Monthly Archives: October 2019
The Best Home Lab For System Administrators
This home lab is great for anyone who is just starting off their IT career and looking to get a step up in knowledge by chasing after it. If your a System Administrator already get yourself a lab anyways because the more you know the better. Having a Home Lab builds your confidence because you…
How To Fix OneDrive High CPU Usage
OneDrive high CPU usage problem Open Task Manager, right-click the Microsoft OneDrive process and select End Task and the restart one drive to see if it works. If step one has not resolved the issue, open Task manager again and end the OneDrive process and exit OneDrive , afterwards navigate to the following location in…
What Are The Top Office365 HIPAA Mistakes
Office365 is a fantastic product, and it can certainly be HIPAA-compliant. But only if you take the time to set everything up the right way for the organization. Here the top Office365 HIPAA mistakes that we see organizations make: Free Outlook.com is not HIPAA compliant! Unfortunately, Microsoft’s HIPAA Business Associate Agreement (BAA) doesn’t cover their free…
Keeping Windows 7 Will Put Companies And Users At Risk
Keeping Windows 7 will put Companies and users at risk if they do not move onto Windows 10. Microsoft will terminate support for Windows 7 on January 14, 2020 and this is coming up quickly there is not much time. It’s not just Windows 7 and Windows Server 2008 that are approaching the end of…
Government Database On 92M Brazilians Found For Sale
A Government Database on 92 million Brazilians was found for sale on a dark web forum. Following a tip-off from a analyst known as Breach Radar, a BleepingComputer reporter investigated the auction of an alleged government database containing the personal information. It was found that the seller called X4Crow was claiming that the database includes…
5 Points To Success In A Zero Trust Model
If you did not know already, a Zero Trust security model is based on the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment controls to monitor and manage data between zones, and more importantly, user interactions within a zone(s). Based on the Forrester Research the Zero Trust Model…
How To Easily Send Secure Files To Someone
Firefox Send allows you to securely and easily share small to large file sizes which is perfect for docs and sharing graphic files or collaborating with co-workers on a presentation. With Send you can share file sizes up to 1GB quickly. To send files up to 2.5GB, sign up for a free Firefox account. The software uses…
Best HIPAA Compliant UTM Firewalls
Do you know what UTM firewalls are the best to use to be HIPAA compliant? Is your Network Secure? How is your organization doing with UTM Firewall logging? If you don’t know the answer to these questions, you’re not alone. I am going to bluntly state that medical offices need to have a UTM Firewall …
Simple Checklist For Creating A Business Continuity Plan
No one can predict the future; however, you can be ready with a sound business continuity plan. The business continuity checklist is the first step in the BCP process. The checklist is not an exhaustive list, it is a simple tool that can be used to ensure that the basic BCP process has been initiated and the…
Apple iTunes Bug Exploited To Deliver Ransomware
The Hackers have been exploiting the “unquoted path” flaw in the Bonjour updater in iTunes for Windows to deliver BitPaymer/iEncrypt ransomware. The Researchers from Morphinsec Labs have identified this flaw with Bonjour updater back in August the team from Morphisec immediately disclosed the vulnerability to Apple. Apple has recently patched the flaw for Windows. Windows…