Google Home in a residents room
So I work for a nursing home/campus and we are starting to get requests about devices like the Google Home. My first knee jerk reaction is NO!. Our rooms are semi private, so most of the time, the...
View ArticleCarbon Black GPO upgrade- Step 2: Leave all machines unprotected??
So once you deploy carbon black sensors via GPO the instructions to upgrade them are:1) Set current GPO to disabled2) force all machines to update policy, uninstalling old sensor3) Deploy new GPO to...
View ArticleComo realizar la configuración de politicas en el ASA y proxy inverso
Buenas noches alguien sabe como cofigurar las políticas en el ASA para trabajar en conjunto con un proxy inverso?
View ArticleFreeRadius and pfsense and OpenVPN
Anyone have any experience setting up FreeRadius OpenVPN on a pfSense appliance?Good, bad or anywhere in between??I am looking at alternatives to help increase remote user's --hassles-- err I mean...
View ArticleRisk Management... Which part do you think is tricky for most orgs?
Much like my morning routine, I savor at least one cup of coffee daily – it’s a non-negotiable. To ensure I get my daily fix, I plan for it thoroughly. I always have a stock of ground coffee and a...
View ArticleBeyondtrust Idea - Mobile App T2PSM-1738
Please up vote the following idea if you are a Beyondtrust customer. Upvoting this idea will really help a lot of organizations, thanks!Https:/ Opens a new window/beyondtrust-public.ideas.aha.io
View ArticleWhat are your favorite tips for teaching young people about internet safety?
Today is Safer Internet Day Opens a new window! This 'tech holiday' is meant to serve as a reminder that everyone plays a role in ensuring the Internet is a safe space for all. In today's digital age,...
View ArticleCybersecurity Resiliency and Your Board of Directors
Growing cybersecurity threats, especially ransomware attacks, and the Securities and Exchange Commission’s (SEC) recent rules (https://www.sec.gov/files/rules/final/2023/33-11216.pdf Opens a new...
View ArticleHow handle user that needs admin rights on Windows desktop?
We have a few users that have local admin rights on their Windows desktops using their domain logins. I'd like to remove these rights, and give them credentials to a local user on their desktop for...
View ArticleWANsdays - "Spam"
Hi, y'all - Chad here. 'Tis the season! No, I'm not talking about Anna Howard Shaw Day. I'm talking about spam, in all its forms, whether physical or electronic. Remember the last time you were...
View ArticleHow do you protect your data while traveling?
Securing your personal information while traveling is trickier than it seems. While planning out your vacation we hope that staying safe digitally is also on your mind. I know I’m a worrier when...
View ArticleHow do you report phishing attempts at your organization?
Phishing is one of the more common forms of cyberattacks that cybercriminals use. These attacks most often take place over text, voice, or email messages. In the more high-effort messages, they...
View ArticleWhat are some of your pen-testing pet peeves?
Does it seem like cybersecurity topics can be a bit depressing with all the doom and gloom? Perhaps it's my drive for optimism in the darkest of areas, but, I was hoping we could lighten up the mood...
View ArticleAuthenticator app that doesn't require a cell phone
A few of our clients require MFA to access their sites. We have been using Authy's desktop app for a few years, but it is going EOL next month. I am looking for an alternative that can either use a...
View ArticleWhole IT Infrastructure Rebuild
Hi, I am with a company and currently setting up a new infrastructure. It's not entirely new, but it is kind of a rebuild due to several problems at different levels. I am new here and have found a...
View ArticleEncryption at rest
In order to be compliant to certain industry standards, our management is asking our company to encrypt data at rest. We have enabled bitlocker on our workstations. How would you go about encrypting...
View ArticleI Got Wazuh up and running over the weekend and.....
It is a remarkable program!That said, I got Wazuh dashboard user admin questions that prevent me from leaving it in service ATM.I would appreciate any help RE default user accounts management. It is...
View ArticleAdministrator account attempts to login to RD once an hour
I've noticed that on one of our remote desktop servers, there is an login attempt once every an hour at 1:44:00 AM. Does anyone know if this is an actual attack or if some process is causing the admin...
View ArticleThe Big Divide...How involved has C-suite been with cybersecurity strategy?
I recently learned that 1 in 3 companies lack C-level engagement in their cybersecurity strategy. That's a pretty big divide! When catching up on what the Spiceworks Community has experienced in the...
View ArticleAnnual Pen test cost
We are starting to do annual pen testing. Since I am new to the annual pen test requirement, I was wondering what this should cost annually. I know it depends on a lot of factors so I will give a...
View Article