UEWA – Ubiquiti Enterprise Wireless Admin
I’m excited to say that I have obtained the UEWA – Ubiquiti Enterprise Wireless Admin certification.
A great starting point is to get yourself familiar with what you will be going through in class. I downloaded the UEWA Training Guide and made sure I completed it. Study the material well if your not a day to day wireless deploying admin.
I know when I took on the challenge of obtaining the UEWA – Ubiquiti Enterprise Wireless Admin certification I did not expect having to learn physics of wireless or mathematical equations.
This class will teach you best practices for deploying Wifi and Unifi specific settings to squeeze the best performance out of each wireless access point.
Additionally you will learn:
WLAN Fundamentals
- Unlicensed Radio Spectrum
- Channel Operation
- Regulatory Domains
- WLAN Standards
- Wireless Access Methods
- Network Equipment
WLAN Planning
- Wireless Technology
- Coverage & Channels
- TX Power
- Antenna Gain
- Channel Availability
- Signals
Do you know the signs of a money mule scam?
Listen, I know it’s hard out there and there are so many ways to make money that seem legit and we all want an opportunity to make quick money but if you don’t know the signs of a money mule scam you will be taken for a ride. When cybercriminals earn money via illegal means, they need a way of ‘washing’ the money to make it seem legitimate and get it back into mainstream circulation. To do this, they recruit money mules.
The mule is a person who transfers illegally obtained money between different payment accounts, very often in different countries, and earning commission for doing it.
Cybercriminals use online advertising to recruit victims via:
- Social Media
- Emails
- Get rich quick schemes
They even create fake websites that look like legitimate websites to make the job seem like it is coming from an established organization.
Keep an eye out for
… Read the restThe 18 Identifiers Of PHI Crossword Puzzle
In this crossword puzzle we will identify a few protected health Information (PHI) words. These words are key to protect ourselves and everyone else that are protected under the Health Insurance Portability and Accountability act (HIPAA).
Click on the link to learn The 18 Identifiers Of PHI, it will also help you with this Crossword Puzzle.
Vertical
Horizontal
I hope this article was helpful, if
… Read the restQUICK HIPAA FACT SHEET
This quick HIPAA fact sheet will point you in the right direction! Did you know HIPAA, the Health Insurance Portability and Accountability Act was created in 1996? HIPAA is designed to maintain strict privacy over an individual’s health records.
Other acronyms you need to know for HIPAA compliance: PII (Personally Identifiable Information), EPHI (Electronic Protected Health Information) or just PHI (Protected Health Information).
HIPAA’s Goal:
To increase the privacy of medical and related information by controlling who has access to it. If you’re a healthcare professional, you are required to understand and follow HIPAA.
Examples of PHI:
Patient name, address, date of birth, phone number, medical record number, Social Security number, email, and diagnosis.
Who Has to Follow HIPAA?
Health plans, healthcare clearinghouses, and healthcare providers. As of January 2013, with the addition of HITECH, HIPAA also now applies to lawyers, consultants, contractors, cloud providers, software vendors, and more.
How
… Read the restCYBER SECURITY IS UP TO ALL OF US!
Having a proper cyber security posture is up to all of us. All information created in the company is subject to the behavior of every collaborator. Use complex passwords and don’t share them with anyone. Note the sender’s and recipient’s domains when exchanging messages. When dealing with suppliers, have the confidentiality terms in mind.
THE HIGHER THE JOB POSITION, THE WORSE THE LOSSES CAUSED BY LACK OF KNOWLEDGE
Managers and leaders must be an example! Decision-making roles are always on the attackers’ radar. Decision makers exchange a lot of confidential information that, if leaked, can cause great loss to the company’s reputation and finances. Use complex passwords and enable two-step verification to create barriers against the attackers.
IF YOU FIND ANYONE NOT COMPLYING WITH SECURITY PRACTICES, DEMAND PROPER BEHAVIOR
Information leaks affect the daily life of all collaborators. If you find unlocked computers, passwords on Post-it Notes, and information about … Read the rest
Kaseya Script To Remove Splashtop
This is a simple Kaseya Script to remove the Splashtop agent from workstations and servers.
What does it do?
I am glad you asked. The script uses the Kaseya scripting engine to execute the uninstallation string for the Splashtop agent. It is a very simple script but it does the job.
<?xml version="1.0" encoding="utf-8"?> <ScriptExport xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://www.kaseya.com/vsa/2008/12/Scripting"> <Procedure name="Splashtop Removal CMD" treePres="3" id="1984353680" folderId="113237001566792" treeFullPath="myProcedures - [email protected]"> <Body description=""> <Statement name="ExecuteShellCommand" continueOnFail="false"> <Parameter xsi:type="StringParameter" name="Command" value="MsiExec.exe /x {B7C5EA94-B96A-41F5-BE95-25D78B486678} /qn" /> <Parameter xsi:type="EnumParameter" name="ExecuteAccount" value="System" /> <Parameter xsi:type="BooleanParameter" name="Is64Bit" value="False" /> </Statement> </Body> </Procedure> </ScriptExport>
I hope this article was helpful, if you have any questions please feel free to contact me. If you would like to be notified of when I create a new post you can subscribe to my blog alert.
… Read the restBack To School Safety And Security Checklist
It’s that time again, many of you are going back to school and a proper safety and security checklist will help you for the coming year. Schools hire new Administrative staff and teachers, teachers and students move to new classrooms, school buildings undergo construction. Before the new school year begins, teachers, administrators and parents should review old emergency plans and make updates accordingly. Share the below lists with the people in your community to make this upcoming school year one of the safest and most secure year yet!
Administrators
- Ensure emergency protocols are in place and posted in each classroom.
- Go over basic emergency protocols with teachers and staff (i.e.: Evacuation, Shelter in Place, Lockout and Lockdown.) Answer questions when possible.
- Review key plan elements such as alert capability, relocation sites, and transportation elements to ensure they are in place.
- Develop a drill-schedule for early and mid-year that practices the
Physical Security Crossword Puzzle
As businesses become more dependent on technology so does the need for digital and physical security. Technology demands a significant amount of physical security to safeguard data, servers, networks and other devices.
Security awareness is not just about preventing cyber attacks, it is also about protecting data in the physical world. Solve the Crossword puzzle below using terms related to physical security.
Vertical
Horizontal
How To Block Mobile Attacks
Mobile Attacks statistics show that more than 60% of fraud originates from mobile devices.
Much of the world has gone mobile, and so have mobile attacks. Of the world’s cyberattacks, around 60% are initiated on mobile devices. About 80% of attacks against mobile devices take place via apps. Apps give hackers access to your device under the hood, so they can easily access your mobile banking app and initiate multiple levels of cybercrime.
Here are a few ways to block mobile attacks.
Wifi |
• Don’t allow your device to auto-join random unknown public networks. • Try to turn off the WiFi when you aren’t using it. • Never send sensitive information over unknown WiFi connections unless you’re absolutely sure it’s a secure network. |
Bluetooth |
• Make sure you have automatic Bluetooth pairing disabled. • Always turn Bluetooth off when you don’t need it. |
Apps |
• Only use apps available |
The 18 Identifiers Of PHI
In this article I will outline the 18 identifiers of Protected Health Information also known as PHI. Under the Health Insurance Portability and Accountability Act, known simply as HIPAA, PHI is any information (identifiers) about health care, health status, or payment for health care that can be linked to a specific individual.
THE 18 IDENTIFIERS
- Names
- All geographical subdivisions smaller
than a state, including street address,
city, county, precinct, and zip code - All elements of dates (except year) for
dates directly related to an individual
(birthdate, admission date, etc.) - Phone numbers
- Fax numbers
- Email addresses
- Social Security numbers
- Medical record numbers
- Health plan beneficiary numbers
- Account numbers
- Certificate/license numbers
- Vehicle identifiers and serial numbers,
including license plate numbers - Device identifiers and serial numbers
- Web Universal Resource Locators (URLs)
- Internet Protocol (IP) address numbers
- Biometric identifiers, such as fingerprints
and voiceprints - Full face photographic images and any
comparable images - Any other