• Articles
  • Contact
  • About
  • My certificates
Jonas SponåsInfoSec & IT Management
  • Articles
  • Contact
  • About
  • My certificates
Jonas Sponås
Good practice, Part 7: Digital e-mail signatures

Good practice, Part 7: Digital e-mail signatures

It is a good practice to sign e-mail. It is as simple as that. But it's good to know how digital signatures work so you understand why you should trust them....

July 8, 2019

How to: Include more than 10 DNS lookups in SPF

I have talked about the benefits of SPF in an earlier article. It's a crucial part of e-mail security. But you can only have 10 DNS lookups in your SPF. What do you do if you hit that limit?...

July 4, 2019

The Hydro cyber attack: How you can protect against it

Earlier this week, Hydro was hit by a ransomware attack. It seems like LockerGoga was utilized by the criminals to encrypt/destroy files on Hydros computers. Even though we don't have all the details about this specific a...

March 21, 2019
Good practice, Part 6: Protect against business e-mail compromise and fraud

Good practice, Part 6: Protect against business e-mail compromise and fraud

E-mail is perhaps one of the most important attack vectors for cyber criminals today. Companies have lost a lot of money due to e-mail compromise and fraud....

March 17, 2019
Good practice, Part 5: E-mail authentication and reporting

Good practice, Part 5: E-mail authentication and reporting

Most businesses send e-mail from individuals and systems to customers, suppliers, and partners. But are you sure these messages actually reach their recipients? What can you do to improve deliverability? This article will ...

December 1, 2018
Good practice, Part 3: Application control on Windows clients

Good practice, Part 3: Application control on Windows clients

Users are able to install some software without admin rights, and malware take advantage of that. In this article I'll discuss how you should mitigate that problem....

October 2, 2018
Good practice, Part 1: Password Policy

Good practice, Part 1: Password Policy

You probably heard about the password policy "industry standard"; 8 characters minimum, complexity rules and expiration after 90 days. But is this good enough?...

September 28, 2018

Jonas Sponås

I’m an IT Operations Manager and have worked with IT operations for more than 10 years. I live in Holmestrand, Norway

My certificates

CISSP
CCSP
PECB ISO/IEC 27001 PI

Recent Posts

  • Good practice, Part 7: Digital e-mail signatures July 8, 2019
  • How to: Include more than 10 DNS lookups in SPF July 4, 2019
  • The Hydro cyber attack: How you can protect against it March 21, 2019

Tags

active directory apple applocker automation business development crankwheel dep digital certificate digital signature e-mail end users enrollment good practice group policy high sierra how to jamf laps lockergoga mac macos mojave nomad nomad login outlook parallels policy powershell protected users ransomware sales script security specops spf windows

Jonas Sponås © 2020