Entries by ktrang

Application Whitelisting Using Software Restriction Policies

Software Restriction Policies (SRP) allows administrators to manage what applications are permitted to run on Microsoft Windows. SRP is a Windows feature that can be configured as a local computer policy or as a domain policy through Group Policy with Windows Server 2003 domains and above. The use of SRP as a white-listing technique will increase the security […]

Security Awareness: A Tale of Two Challenges

SANS Institute has recently releases their findings from a survey ‘Securing The Human 2016’ about Security Awareness that led them to uncover two key findings: First, the security awareness team are not getting enough support they need and second, the experts in the field of security awareness lack soft skills to get the knowledge they have […]

Patch Management – Best Practices

Why Does Patch Management Matter? Simply put, patching is important because of IT governance. As a corporate IT department, you’re held responsible when viruses affect users or applications stop working. It becomes your problem to solve. Securing your organization’s end points against intrusion is your first line of defense. With an increasing number of users […]

A note on Group Policy and gpudate

When I first started learning about Active Directory, Group Policy always seemed very fickle. Sometimes I could run GPUpdate, other times I had to append the /force option. As it turned out, Group Policy was always working –  I just didn’t understand it. So what’s the difference between GPUpdate and GPUpdate /force? Well – GPUpdate: Applies any policies […]

How Attackers Use a Flash Exploit to Distribute Malware

Adobe Flash is multimedia software that runs on more than 1 billion systems worldwide. Its long list of security vulnerabilities and huge market presence make it a ‘target-rich environment’ for attackers to exploit. According to Recorded Future, from January 1, 2015 to September 30, 2015, Adobe Flash Player comprised eight of the top 10 vulnerabilities […]

What is Private Cloud Hosting?

A private cloud is a model of cloud computing in which a partitioned and secure cloud based environment is provided for individual clients. As with any other cloud model, private clouds provide computing power as a service within a visualized environment using an pool of physical computing resource. However, the private cloud model, this computing […]

Service Desk vs Help Desk Services – What’s the Difference?

Service Desk vs. Help Desk. Hmmm. But…aren’t they the same thing? If that’s your reaction, you’re not alone. It’s generally agreed there’s some gray area involved. So why make a big deal about it? While strikingly similar at first glance, a closer and more practical look reveals differences that go beyond tomato-tomahto, potato-potahto wordplay. Because […]

Mobile Device Management

Mobile Device Management: A Growing Trend From smartphones to tablets, mobile devices in the workplace are here to stay. Employers are happy to let employees access company email and other corporate data from mobile devices, but they often underestimate the security risk to their IT network. Whether your clients embrace a Bring Your Own Device […]

5 Steps to a Stronger Backup Disaster Recovery Plan

Between catastrophic natural events and human error, data loss is a very real threat that no company is immune to. Businesses that experience data disaster, whether it’s due to a mistake or inclement weather, seldom recover from the event that caused the loss. The saddest thing about the situation is that it’s possible to sidestep […]

4 Patch Management Practices to Keep Your Network Secure

Patching is vital to securing systems from known vulnerabilities, but it’s also a risk that can bring down those systems if you deploy a bad patch. In order to maintain the proper risk balance you should focus on patches that close vulnerabilities. Even once you establish your risk balance, you are continually under the threat […]