Initially, Valak malware was a threat loader but lately, it has turned into a full infostealer program and attack US and German companies. Researchers write that over half of a year Valak has received more than 20 updates. The malware spreads through phishing attacks via Microsoft Word documents with malicious macros. If the malware penetrated…
Microsoft has released the last patch for Windows 7 that broke the installing desktop wallpaper setting feature. Microsoft isn’t going to release updates for W7 anymore so users have to fix it by themselves. Updates with surprise The support period has expired on January 14, 2020 and the last update for Windows 7…
IT-monitoring is process of collecting indicators of hardware and software in the IT environment. The essence of it-monitoring is to ensure that the equipment works in the right way and on the needed level of the performance, which is required for the normal maintenance of the business. The basic monitoring solution often consists of sending…
During the life cycle of the operating system, the company provides free update support, and the end of this cycle has to come. That’s what happens to Windows 7. The strategy of Microsoft is to refuse of support Windows 7 in order to promote and popularize Windows 10 OS. They say that Windows 10 has…
The point of an update policy is to make the update process predictable, with procedures for notifying users so that they can plan their work accordingly and avoid unexpected downtime. The policy needs to address several distinct types of updates. The most familiar are the monthly cumulative security and reliability updates that are delivered on…
As we all know every operating system needs in support. But what will you do when the support will end? I should recommend you to look at such variant like extended Windows 7 support, cause the current support is going to end in January of 2020. But if you need keep going to run Window…
It would be great if the process of securing a Windows 10 device can be reduced to a simple checklist. But the process of securing is much more complicated than that. The initial setup simply establishes a security baseline. When this configuration is complete, security needs continued vigilance and ongoing effort. A big part of…
There is a ton of information about paperwork needs to be done to comply with GDPR. Here we would answer the question: «What technically should be done at your mail server to meet requirements?»
Having examined the effect of the WannaCry and Petya viruses and how the attacks affected our customers, we would like to share our findings and give general cybersecurity recommendations.
In today’s age of Cloud Computing, each user has their own cloud storage for photos and an ever increasing number of companies rent cloud servers. This raises critical questions about the security of the stored information.
Typical users have a lightminded attitude for password security. Our experience shows that even if a company uses strict policies, provides user training, etc., unencrypted devices still make their way outside the office.
Many companies using VDI infrastructure for remote work from the uncontrolled personal workstations of the company’s employees. External users face the problem of distrusting the certificate issued by the corporate certifying authority when publishing a VDI farm to the Internet.
No matter how many supporters of the old version of the OS exist at present, it’s high time to turn to Windows 10. Accordingly, I invite you to take a closer look at the preloaded Metro apps. You will agree with me that very few people use absolutely every application forced upon us by Microsoft.
This post continues the series of articles about SharePoint Server. In the first part, we looked at features for collaborating using Office Online and the desktop version of MS Office programs. This article will show you how to start and publish using SharePoint + Office Online.
Collaborate on documents with Microsoft: SharePoint 2016, Office Online and everything else. Part 1: What is it?
But Microsoft has been unfailingly persistent – they continue to improve their products all the time, on multiple levels as a result, now we can talk about the established infrastructure of document collaboration offered by Microsoft.
Like any other company, IT companies providing high tech services – whether software development, IT outsourcing, or remote infrastructure support – need tools to maintain adequate work discipline.
BitLocker is the built-in Microsoft Windows feature for full disk encryption that offers enhanced protection against data theft on stolen or lost computers or hard disks.
How to Configure Microsoft Azure Multi-Factor Authentication Server (MFAS) as a Second Authentication Factor
Why MS Azure? Best AD integration, which is very convenient when the same VPN account is used for multiple resources.
Connecting to corporate resources via Cisco AnyConnect using FreeRadius and Google Authenticator has its pros and cons. One noteworthy advantage is the cost: it’s free.
Skype Cloud Connector Edition: The way to Integrate Corporate PBX and Setup PSTN Calls with Skype for Business Online (Office 365)
Skype for Business CCE is a hybrid solution that allows integrating the corporate PBX with the Office 365. CCE offers a set of components offering organizations to connect to the corporate PBX, organize the SIP trunk from your Office 365.
A couple of days ago Microsoft released the Cloud Connector Edition (CCE) for Skype for Business Online, a hybrid solution that enables integrating your corporate PBX with the Office 365.
After the launch of Windows 10 the internet was flooded with messages about the collection of users’ personal data followed by multiple discussions about how to tackle the issue. The user community instantly came up with a list of major servers that collect data and tried to block them via the HOSTS file.
The competent approach to IT security in terms of server authorization, both inside and outside the company premises, implies a number of important measures. They include providing a unique user name and meeting password complexity requirements, as well as conducting the planned password change and non-disclosure of credentials to third parties, etc.
Malware, or malicious software, stands for a broad range of applications designed to harm your computer or use it to do damage elsewhere. Malware comes in different shapes and sizes including viruses, Trojan horses, spyware, and others
Until recently, «public» communication tools (such as Skype, Telegram, WhatsApp) and corporate communication tools (Lync, Sametime, etc.) were separated by a difficult-to-penetrate wall. Corporate messengers have well-developed security and auditing features.
Outsourcing IT infrastructure services is a logical step for a growing business. When a qualified contractor is selected, it allows an organization to optimize IT costs and improve quality of service.
The large number of hacks of celebrities’ email accounts reported by the media and widely discussed by the general public cause users to be greatly concerned about the safety of their data.
In this article we will review the installation of Bitlocker with the TPM module on the Hyper-V Server 2012 R2 Core.
Businesses require copious amounts of technical support to keep pace with the ever increasing impact of technology in the modern world. Choosing the best support provider to align with your needs whilst remaining cost-effective can be a critical challenge.
While I was listening to a recent interview with the respected Eugene Kaspersky, where he expressed the idea that most of the company’s employees will not have Internet access soon, I was reminded that many companies completely separate their internal networks from the Internet