Cybersecurity

258

Solutions

26

Articles & Videos

613

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Related Topics

  1. Security
  2. Network Security
  3. OS Security
  4. Vulnerabilities
  5. Anti-Virus Apps
  6. Networking
  7. Encryption
  8. Windows OS
  9. Ransomware
  10. Hardware Firewalls
Refine results

I heard that the ransomware that screwed up the british health system and many others.... that was because they were running win xp machines?

or is it more than that?

Any tips on protection?

972 views
Migrating Your Company's PCs
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Greetings,

A few days ago, we had an email attack that resulted in hundreds of emails being sent (or attempted to be sent) through our Exchange 2010 server and our ZixGateway secure email …

1440 views

In my experience connecting to a corporate VPN makes my computer a part of another network.  This means that my computer and possibly other computers on my network are now visible to the corporate …

1938 views

I have a client with a Windows 2008 R2 Remote Desktop Services Server (Terminal Server). It has commend to my attention that a user account was compromised allowing an unknown person to gain access …

434 views

Hi guys

Could you help me with few settings please? how to setup it etc

-      Only computers with the latest updates can login into our network ? via remote access and vpn  ?
-      Should we disable …

44101 views

Hi to All of you,
during the last days, while we were all concentrated on the Wannacry ransomware, Wikileaks released more information/files on the VAult7 arsenal.
 
I've been asked to check and …

759 views

hi,

Right now as there are more and more zero day attack and security patch sometime is too slow to apply.

what is the way you guy used to deploy patch asap ? WSUS ? any robust way to do it ?

2949 views

Hi, I got this error when installing patches for MS17-010 and MS14-066. Window Update service is running, the patches is x64, same with Window. I checked CMD -> systeminfo but could not find the …

1158 views

I need to implement TDE for an SQL Database, but we use SQL 2012 Web Edition and apparently TDE is only available for Enterprise Edition, but the difference in cost from Web Edition to Enterprise …

140 views

Hi, just looking for a better way of managing WSUS v 6.3.9600.18228
We automatically approve Critical, Definition and Security updates
We sync Critical, Definition, Feature Packs, Security Updates, …

234 views
Free Tool: Site Down Detector
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Dear
How  I Can protect my servers running server 2008r2 , data center 2012r2 and 2016 from Ransomware attack these days , i have already Kaspersky endpoint security last version with last updates …

23107 views

Hello Experts - I am looking for a way to better protect my company from the cryptovirus malware that seems to be everywhere these days.  I have a basic level of security with a Barracuda email …

950 views

Hello Experts,
What are the safe steps we can take to protect our machines
 and the computers of our customers from this cyber attack...??

Any patch, or antivirus... or maybe other procedures?

259 views

Can anyone recommend a multi-factor authentication vendor that supports SMS that can be used for shared accounts.  For example - needing 2 factor to protect a 365 admin account but rather then go to 1…

437 views

Hello

We are running Windows Server 2012. We have a bespoke application that needs Microsoft RRAS service installed on these boxes that is disabled by default.

Our Cyber teams are pushing back …

1347 views

Hi Experts
After i lost all data by ransomware attack i need to know that

1- How can i protect my files from this type of virus.
2- How can i protect my Shadow Volume Copies from delete or …

12108 views

Hi,
I hope someone can help me with this.

I have received a computer and a robotic machine (PC that connects to a Robotic machine through a cross over cable).
Currently, I have 2 issues:

1. I …

595 views

I have read below article.

So if this trojan is very hard to detect actually it can run in my company and  I will never know. Any guides ?


28117 views

Hi All,

Can anyone here please let me know what's the security best practice for the SYSVOL folder in my domain controller ?
I've got about multiple (~12) Domain Controller/GlobalCatalog which is …

14145 views
Free Tool: Subnet Calculator
Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

I had this question after viewing Office 365 email archive feature and comparison with different 3rd party ? …

674 views

So just as doctors are bound by HIPAA/HITECH and Banks are bound by Gramm-Leach-Bliley Act, what regulatory requirements are Payroll companies bound by?

340 views
Cyber Crime
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to access all your sensitive information.
0192 views

We have received several email that the Display name is our company user but the actual email address is from external email. Is there any application that can identify this kind of emails ?

In …

22126 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for McAfee Endpoint Security 10.

Many thanks in advance.

244 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Trend Micro Office Scan 11.0.

Many thanks in advance.

257 views
Show more content
201506-LO-Top-001

Cybersecurity

258

Solutions

26

Articles & Videos

613

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Related Topics

  1. Security
  2. Network Security
  3. OS Security
  4. Vulnerabilities
  5. Anti-Virus Apps
  6. Networking