Shield Your Endpoints from Cyber-Badguys with Intune ASR Rules
Intune provides powerful policies to protect endpoints from evil hackers.
Shield Your Endpoints from Cyber-Badguys with Intune ASR Rules Read More »
Intune provides powerful policies to protect endpoints from evil hackers.
Shield Your Endpoints from Cyber-Badguys with Intune ASR Rules Read More »
A strange case, indeed; accenting the “strange” part…
The Strange Case of the AV Exception Read More »
33 years in the IT business, and I only have one regret.
Regrets? Yes – only one. Read More »
And just like that, all my OneDrive files were gone. No warning, just Poof!! All gone…
Now the hunt was on for a replacement.
The Day Microsoft Messed Up My Files Read More »
What is Cybersecurity Posture and How to Improve It Find our what cybersecurity posture is Video version of this article below Head to v2cloud.com and fill out the Cybersecurity Grader Before we begin discussing such things, we must begin by defining some words; words, after all, have meaning, and it is crucial that we all
What is Cybersecurity Posture? Read More »
(Note: referenced media articles are local to Quebec, therefore in French) “I have good backups, so we’re well protected.” No. Sorry, but no. Talk to Mr. Marquis of Marquis Equipment in Sherbrooke; last November, his company was robbed of $120,000.00. https://www.journaldemontreal.com/2020/11/12/fraudes-de-120000-apres-une-cyberattaque But…he had “good backups”. When it comes to the security of your data,
When you open a browser and you want to go – for example – on Facebook, you simply type in “www.facebook.com”. However, the big, complex network that powers the Internet does not understand this “address”; it needs to translate this to something that it understands. It needs to send your request out somewhere and say,
Protection at Home Read More »