I recently had to install and configure the amazing AlienVault security appliance at a client site who had recently upgraded
If you are looking to get started with OpenVAS 9 then grab a cup of coffee, fire up a VM, and follow my simple guide to get yourself up and running in no time.
I’ve been looking for a way to easily migrate a Trend Worry Free cloud customer from one reseller to another. Quite
Ransomware is almost impossible to remove and, if I’m honest, you’re unlikely to catch a break and get your data back. However things might have just gotten that little bit easier, that is if you find yourself under the cosh of TeslaCrypt because ESET have just made a decryptor.
The face of malware has changed over recent years and it’s safe to say that it’s become an industry like any other. Your data, and it’s importance to you, has a value and it’s one that people are only to keen to capitalise on. In this guide I’ll show you how to use a built in feature of Windows Server to nail down your network.
The content modification feature of Smoothwalls can be a real lifesaver if you need to enable features within a website session or direct users to a certain section of a site.
The Petya malware changed the ransomware scene in that, instead of encrypting all your files, it just encrypts the boot records and file tables of you hard drive making it super fast. Now, one man had enough and has managed to crack the encryption used by Petya.
In a previous post I’ve been looking at how to use file screening to help block CryptoLocker. File screening is a great feature of Windows Server 2012 but the set up can be a pain. With this in mind this is a handy script which will make all the configuration changes for you.
Those of you working in the educational sector will now that Smoothwall devices are pretty much ubiquitous and you’ll be familiar with their web filtering and blocking features. In the just-released Framlington software update Smoothwall are putting in place the building blocks to take eSafety reporting to the next level.
Google have released a new Devices and Activity Dashboard to help hard pressed Google Admins manage their users security
An amazing 45% of some phishing attacks manage to trick end users in to giving up their details. See the issue in a new infographic from Google.