A domain registration and its associated accounts are a keystone to your organization’s security. Most of the items on the checklist are not time-consuming or difficult. Ensure that your Domains are fully locked at the registry level. Name a Domain Name Administrator. Ensure updated WHOIS records. Renew your domain names. Unused or expired domains, delete them. Use a reliable Registrar … Read More
Google Simplifies Hardware Security Key 2FA Options.
Google today effectively simplified its lineup of Titan 2FA hardware keys to just two types of keys: USB A and USB C, effectively dropping BlueTooth connectivity. Both of the keys fully support Near Field Communication Functionality (NFC). This NFC functionality makes it compatible with the majority of mobile devices by simply tapping the mobile phone for a secure log in. Availablity … Read More
Enhancing Security on your Synology NAS.
Synology recently published five ways to improve your security and data privacy on its NAS devices. Client-Side Encryption Private Surveillance storage, locally to your NAS. DNS over HTTP’s. Every request sent over an encrypted connection Enable Multiple SSL certificates on you NAS, now including Let’s Encrypt Support VPN Plus son selected Synology routers. Synology’s Security advisor runs a check-up of … Read More
Avoiding focused Spear-Phishing campaigns.
Microsoft’s Security Blog recently published an excellent article covering a growing trend in security attacks. Written by Diana Kelley Cybersecurity Field CTO and Seema Kathuria Senior Manager, Cybersecurity Solutions Group, it cleverly describes spear-phishing campaigns that are highly focused, and successful. These attacks do not target large or broad email lists, but rather a person within an organization. Experienced tech executives and … Read More
Synology Solutions Training – NAS Security & Data Protection.
On August 22, 2019, Synology America hosted a live webinar to its Business and Service Partners. Cody Hall, Synology’s Technical Account Manager, once more hosted a great session indicating the best practices for securing Synology Devices and protecting its data. Past events covered File sync, Data Redundancy, and Enterprise Recovery. Today’s event covered strategies to minimize exposure to: Man in … Read More
A quick guide to avoiding phishing.
Keeping your data secure is a challenge for all business. Small and Large. In light the recent events that have triggered the loss of data to ransomware, please keep in mind the following simple but effective steps to avoid losing data: Watch out for scam email. Fraudsters are getting more sophisticated by the day, making you take a second and … Read More
Google Project Zero reveals critical flaws in CPU architectures.
Google’s security researchers with the now famous Project Zero, disclosed yesterday two vulnerabilities, named Meltdown and Spectre. Even as the new year starts, this could be 2018’s largest vulnerability discovery, as it affects all software running on Intel processors, regardless of Operating System. Basically, every Intel processor after 1995 is affected. The vulnerability exploits “out of order execution” The large group of researchers collaborated from … Read More
Vulnerable: Intel Management Engine, Server Platform Services and Trusted Execution Engine.
Intel has released a security notice regarding its ME, SPS and TXE platforms. These vulnerabilities provide an entry point at the firmware level, allowing malicious high privilege process to run code and programs before the Operating System. The vulnerability is also exposed remotely. Affected Chipsets Include: Intel Core Processors 6th, 7th, and 8th Generation Intel Xeon E3-1200 V6 and V5 Intel Xeon Scalable … Read More