Want to take advantage of excellent cloud services? Amazon Web Services may be the perfect solution, but don't forget about AWS security. Whether you want to use AWS for a few things or everything, you need to protect access to it. Then you can make sure your business can run smoothly. Read on to learn some important AWS security tips. Use Multi-Factor authentication When … [Read more...] about 11 Useful Security Tips for Securing Your AWS Environment
Tips
Tips to improve your security program in 2021
Insights from the Cisco 2021 Security Outcomes Study With organizations demanding more agility in the way business is run, the security function has an increasing need to keep up with change. The reasons are all well known. Technology change drives business change, and vice versa, in an increasingly dynamic merry-go-round. Security has to underpin this change to support … [Read more...] about Tips to improve your security program in 2021
Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
Thank you for tuning in to the fifth and final installment of this blog series. As I stated in my previous blog posts on orbital advanced search, my father was an automobile mechanic. More specifically, he was a “brakes and front-end mechanic”. On several occasions, Pops would point out the wear on a set of tires and would tell me that either the car was out of alignment, … [Read more...] about Getting more value from your endpoint security tool #5: Querying Tips for Vulnerability & Compliance
4 Tips to Protect your macOS Environments
Over the past year, CrowdStrike® Services has observed threat actors increasingly targeting macOS environments — and using relatively unsophisticated methods to gain access. Even though workplace macOS systems have become increasingly popular, organizations often lack adequate macOS endpoint monitoring and management capabilities, compared to their Windows systems — making Macs … [Read more...] about 4 Tips to Protect your macOS Environments
Getting more value from your endpoint security tool #4: Querying Tips for IT Operations
As the son of a retired automotive mechanic, the lessons my father taught me are still just as important today. As I mentioned in my previous post about Orbital Advanced Search, “Pops” was always teaching me something. This time it was to always clean the tools after every job, maintain the tools that need oil, etc., and to always keep your tools organized neatly in the … [Read more...] about Getting more value from your endpoint security tool #4: Querying Tips for IT Operations
Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation
Have you ever looked around the house for a specific tool to complete a task? And, after looking high and low, even scouring through that bottomless “junk drawer,” you were unsuccessful locating it. Then, you decide to just use what you have readily available. You know, using that flathead screwdriver as a chisel or a prybar, which inevitably breaks because you did not use the … [Read more...] about Getting more value from your endpoint security tool #3: Querying Tips for Incident Investigation