Difference between revisions of "Template:BSWPaul155"

From Security Weekly Wiki
Jump to navigationJump to search
Line 15: Line 15:
 
#[https://www.itsecurityguru.org/2019/12/09/100-customers-hit-by-ransomware-attack-msp/ 100 Customers hit by Ransomware Attack MSP]
 
#[https://www.itsecurityguru.org/2019/12/09/100-customers-hit-by-ransomware-attack-msp/ 100 Customers hit by Ransomware Attack MSP]
 
#[https://www.computerweekly.com/news/252474610/Enterprises-muddled-over-cloud-security-responsibilities Enterprises muddled over cloud security responsibilities]
 
#[https://www.computerweekly.com/news/252474610/Enterprises-muddled-over-cloud-security-responsibilities Enterprises muddled over cloud security responsibilities]
#[https://gen.medium.com/screw-productivity-hacks-my-morning-routine-is-getting-up-late-aa6dc01b982b Screw Productivity Hacks: My Morning Routine Is Getting up Late]
+
#[https://gen.medium.com/screw-productivity-hacks-my-morning-routine-is-getting-up-late-aa6dc01b982b Screw Productivity Hacks: My Morning Routine Is Getting up Late] - I love this article: ''I am not an early riser. I don’t find mornings invigorating, I don’t do yoga with the sun coming up, I don’t read the paper in a quiet corner or sip on hot coffee as I check my email. I hate that shit.''

Revision as of 19:30, 9 December 2019

  1. Security Think Tank: In-depth protection is a matter of basic hygiene - Defining "The Basics" is one thing, understanding what level of protection it gives you is another:Start with the basics:
    1. The IT estate is up to date with software and firmware patches.
    2. All default passwords have been changed.
    3. IT administrators and technicians have two accounts, one for day-to-day (email, report writing, and so on) and one for working on the IT estate.
    4. Only IT administrators and technicians have administrator privileges in the live network (users must not be given administrator access, even to their own company-provided PC).
    5. Good password policies are enforced, together with user access privileges and function (for example, sales should not be able to access HR files and people who only need to read files are restricted to read only).
    6. Unused accounts are regularly decommissioned or removed from the access control system.
    7. The IT estate as a whole is regularly backed up and there are easy-to-access policies, standards, procedures and work guides which are maintained and used.
  2. To Build a Strong Culture, Create Rules That Are Unique to Your Company - Could be unique to your team, provided it is aligned with the company goals and culture: Horowitz’s argument is as simple as it is powerful: You can’t create something unique and compelling in the marketplace unless you first create something unique and compelling in the workplace. Truly great organizations work as distinctively as they hope to compete.
  3. Is Air Gapping Really a Solution?
  4. Cyber security: How to avoid a disastrous PICNIC
  5. Why Working Alone Is Smart: 4 Strategies to Find Time for Yourself
  6. What isn't 'as a Service' in enterprise technology?
  7. the 3 lists you should be making
  8. 100 Customers hit by Ransomware Attack MSP
  9. Enterprises muddled over cloud security responsibilities
  10. Screw Productivity Hacks: My Morning Routine Is Getting up Late - I love this article: I am not an early riser. I don’t find mornings invigorating, I don’t do yoga with the sun coming up, I don’t read the paper in a quiet corner or sip on hot coffee as I check my email. I hate that shit.