What Your Out Of Office Message Tells Hackers
It’s time for a vacation or your going on a business trip and your super excited, naturally our out of office message may reveal some of this excitement to hackers. People don’t naturally think about how cybercriminals would benefit from the details of your Out Of Office Message (OOO). But this attack vector is a…
Configure Unifi Controller Ports On Ubuntu 20.04
In this tutorial you will be shown how to configure Ubuntu 20.04’s Uncomplicated Firewall (ufw) with the necessary Unifi Controller ports. [embedyt]https://www.youtube.com/watch?v=rwOSXBRewLs&width=425&height=250[/embedyt] Lets Get Started First make sure that you have already have your Unifi Controller Installed and working. Log into your Ubuntu 20.04 using putty via SSH. We will now configure a proper firewall…
Is A Comcast Business Modem HIPAA Compliant?
I know the reason your here is to find out if a stand alone Comcast Business Modem can be used in a Medical Practice and pass the HIPAA compliance security check for protecting a healthcare network. Well, first there are a few things we need to know about HIPAA and Firewall Requirements. HIPAA Firewalls 101…
Why you need a Healthcare Virtual CIO
Your Healthcare Virtual CIO (vCIO) will be your advocate and advisor. A Healthcare vCIO will offer you the highest quality customer service and they will have scheduled visitations to your healthcare business to offer ongoing assistance. How a Healthcare VIRTUAL CIO Works For You. Analyze your current IT environment and provides regular assessments. Develop an…
Windows Server Pending Reboot Status Won’t Clear
Troubleshoot and resolve the issue of a persistent pending reboot status on Windows Server with our comprehensive guide. Get your server back on track!
How to clear all event logs with .bat file for CMD
In this tutorial you will be shown how to clear all event logs with a .bat for CMD. This Bat file will come handy to clear stuck events from the logs or if your event viewer is crashing cause by too much data. Let’s get started. Open notepad or notepad++. Copy the contents blow and…
Configure Attack Defense with TP-Link Omada Controller
In this TP-Link Omada tutorial, you will be shown how to configure attack defense security settings with the TP-Link Omada Controller. Why should we properly configure TP-Link Omada Attack Defense? Attack Defense provides protection against outside cyber attackers by shielding your computer or network from malicious or unnecessary network traffic. TP-Links Omada Attack Defense can…
Configure Wireless Network with TP-Link Omada Controller
In this tutorial, you will be shown how to configure a Wireless Network with the TP-Link Omada Controller. Let’s get started. Before we start this tutorial is under the impression you already have additional networks created. If you need help with creating new VLAN Networks Click Here. You may want to create a VLAN if it…
Configure VLAN Network with TP-Link Omada Controller
In this tutorial, you will be shown how to configure a new VLAN network using TP-Link Omada Controller. Let’s get started. Log into your cloud controller either using the omada.toplinkcloud.com URL or The IP address assigned to the TP-Link Omada Controller. Once logged in go ahead and expand the menu by sliding your mouse to the left…
Configure Network Segmentation with TP-Link Omada Controller
In this tutorial, you will be shown how to configure network segmentation with the TP-Link Omada Controller. Segmentation is an ideal practice to protect your TP-Link Omada network. What is network segmentation? Network segmentation is, to put it as simply as possible, the practice of dividing a larger computer network into several small subnetworks that…