Good practice, Part 7: Digital e-mail signatures
It is a good practice to sign e-mail. It is as simple as that. But it's good to know how digital signatures work so you understand why you should trust them....
It is a good practice to sign e-mail. It is as simple as that. But it's good to know how digital signatures work so you understand why you should trust them....
I have talked about the benefits of SPF in an earlier article. It's a crucial part of e-mail security. But you can only have 10 DNS lookups in your SPF. What do you do if you hit that limit?...
Earlier this week, Hydro was hit by a ransomware attack. It seems like LockerGoga was utilized by the criminals to encrypt/destroy files on Hydros computers. Even though we don't have all the details about this specific a...
E-mail is perhaps one of the most important attack vectors for cyber criminals today. Companies have lost a lot of money due to e-mail compromise and fraud....
Most businesses send e-mail from individuals and systems to customers, suppliers, and partners. But are you sure these messages actually reach their recipients? What can you do to improve deliverability? This article will ...
There are multiple solutions out there that enable sales to share their screen over the web to prospects. Where I work we sell software as a service, and want to demonstrate to prospects how our products work. So finding a...
I had a weird experience with an Parallels MacOS vm on my MacBook Pro this week. By accident I stumbled upon a solution / workaround. ...
Recently, with help from my good colleges, we finally managed to to configure a working enrollment workflow with Jamf for our DEP Mac's. Since we had quite a struggle I would like to help others out there by documenting ou...
PowerShell plays an important part in managing a corporate infrastructure with Microsoft components. But why?...
In this article I will cover how to delegate admin rights to ICT staff throughout the business, so you enable them to do their job and at the same time mitigate the risk of having admin rights....
Users are able to install some software without admin rights, and malware take advantage of that. In this article I'll discuss how you should mitigate that problem....
If you set up a fresh copy of Windows, the default user account will have administrator rights. You should do something about that. But why, and what?...
You probably heard about the password policy "industry standard"; 8 characters minimum, complexity rules and expiration after 90 days. But is this good enough?...
Ever wanted to make sure your Outlook contact list contain the current employees in your organization?...