Security News

Security News2018-05-30T15:32:31+00:00
3105, 2018

Windows Update Management Tips

By |May 31st, 2018|Categories: Information Security News|

Windows Update Management Tips Windows Updates…  Believe it or not, they’ve been around since the days of Windows 98.  They are often despised by end users and IT support staff because they may interrupt the workday, delay leaving at the end of the day, or they may break functionality.  Along the way, Microsoft has improved the deployment and installation process with functions such as Windows Server Update Services (WSUS). [...]

2305, 2018


By |May 23rd, 2018|Categories: Information Security News|Tags: , , , |

Virtual Private Networks: Should you be using one? A VPN, or Virtual Private Network, allows you to create an encrypted connection to another network over the Internet.  Most users are familiar with them for connecting back to their institution’s network for remote access.  While this is one reason to use a VPN, it’s far from the only reason to use one.  In today’s environments, eaves-dropping, public Wi-Fi, and location [...]

1005, 2018

GDPR is coming… but what does it mean, and why should I care?

By |May 10th, 2018|Categories: Information Security News|Tags: , , , |

GDPR is coming… but what does it mean, and why should I care? If your organization hasn’t heard these four letters by now, it may not be time to panic - but it is time to learn what they mean and if they could impact organization.  Below is a brief overview intended to get you familiar with this new international regulation and hopefully answer some of the basic questions. [...]

2604, 2018

50 Shades of Administration – Managing Domain Admin Privileges

By |April 26th, 2018|Categories: Information Security News|

50 Shades of Administration During our work, both our auditors and engineers have noticed a common issue our clients large and small have – overly permissive administration accounts.  Many times, we see all IT users given a Domain Admin account, from the greenest helpdesk tech, to the person overseeing the network.  Microsoft’s Active Directory has a couple of different ways to grant rights to a user, group, or organizational [...]

2203, 2018

New Easy Password Standards? Not so Fast!

By |March 22nd, 2018|Categories: Information Security News|

Passwords… it's no secret; most of us are really bad at creating and maintaining passwords. In fact, 81% of hacking related breaches leveraged either stolen or weak passwords. But unfortunately, passwords won't go away any time soon. Almost every resource, application, web site, and the like requires some form of username and password. Because of this, it's no surprise that almost all of us struggle to follow recommended password [...]

803, 2018

Mimikatz – How it is Used to Exploit your Network

By |March 8th, 2018|Categories: Information Security News|

Bad Kitty How Mimikatz is used to exploit your network and what you can do about it. For this blog post I wanted to highlight a common attack vector that we often use in our penetration testing. My goal is to run through the process at a high level, and then cover some of the steps you can take to mitigate your risk. Specifically, this post will cover a [...]

Load More Posts

“I am always pleased with the knowledge we gain and the help we receive from 10-D staff. I also like the fact that I can call anytime for additional help!

— SY $120M FI in Central Plains

Keep your institution off the evening news. Contact us today!

Contact Us Now