One of the key features of the newest firewalls and intrusion protection systems (IPS) has been the addition of something called GeoBlocking. This feature allows the administrator to shut down traffic to or from specific countries or regions of the world and your local network regardless of any other firewall permissions in place.
Trend Micro has stated many times that you have approximately 4 minutes between when a threat enters your network and the infection breaks out. But who can respond that quickly? I have often said if we leave questions on the computer up to our end users, we have failed.
At some point in your life, you probably were locked out of something – your house, your car, your office. I am sure it was awful trying to figure out how you were going to solve that problem. However, to add to your stress, we now have all this sensitive data online and on our […]
Most of Google’s products are free. The reason is that you are their product. Their computers read your emails. They send you targeted ads based upon what you read and write. They track your location. They track your likes and dislikes. They have made your life more convenient by syncing all your Google Chrome data.
It is important to have accountability to the taxpayers independently proving that each school district has adequate financial controls in place and is properly managing the money it has been entrusted. In this era of identity theft, ransomware, and electronic financial theft, it is equally important to have adequate technical controls in place to protect […]
Recently I read an interesting article on malware development techniques. SentinelOne, Cisco AMP, and other antivirus products rely on the VirusTotal clearinghouse. This is a clearinghouse that has approximately 67 antivirus vendors. Various antivirus and advanced endpoint products upload suspicious programs to ask, “is this a virus?”. You get a score back of x/67 for […]
We have to be constantly vigilant to prevent malware, trojans, and other bad actors from taking root in our school networks to steal personally identifiable information (PIA) and money. Besides web filtering, antivirus, patching, and now advanced endpoint protection, we also have to look at policies.
The school year has started and we’re anxious to update you on what our webinar, seminar, and Tech Talk schedule for the Fall and Winter. Wednesday, September 26th 10:30 pm – Webinar – Troubleshooting SCCM Configuration Manager. Wednesday, October 3rd 10:00 am – 3:00 pm – Cisco Meraki Hands-On Workshop at CSI. Tuesday, October 23rd […]
SCCM Configuration Manager is an amazing tool. But when things don’t go as planned, that tool becomes immensely frustrating. Scott Quimby will walk you through some basic SCCM troubleshooting techniques focusing on: Where the logs are Services that run How SCCM gets updated What to do if updates are stuck.
On Wednesday, October 3rd Cisco Meraki will be running a hands-on workshop where you can learn all about the new additions to Cisco Meraki’s cloud-managed portfolio. The event will include: Hands-On Workshop Coverage of the entire Meraki full stack portfolio Lunch with your Cisco Meraki Team *Please bring your laptop to participate in the hands-on […]