As a systems administrator, it has always been a difficult struggle to balance Microsoft User Rights Assignments in the Windows…
The end of the Windows 7 lifecycle is fast approaching: January 2020. This pending “end of life” means Microsoft will…
Isolation is an increasingly popular endpoint security strategy, and with good reason. It reduces risk by separating endpoint attack vectors…
Many IT organizations use app sandboxing in an attempt to safeguard sensitive information from cybercriminals. It’s a pretty straight-forward concept:…
Network Isolation, the segmenting of a computer network into separate zones with distinct trust levels, for the purpose of containing…
When considering endpoint security strategies, it’s incredibly common to have an endpoint protection platform (EPP) in place. Let’s face it…
Security alerts help organizations quickly detect advanced cyber attacks. However, organizations are often bombarded with alerts from an array of…