Category Archives: Security

Microsoft Office Security – Disable Macros

Executable code embedded within Office documents continues to be a popular way to deliver malware. Office, by default, opens files downloaded from the internet in a safe way, that prompts the user to first enable editing, and then again to … Continue reading

Rate this:

Posted in Applications, Office 365, Security | Tagged , , , , , , | Leave a comment

What is Cyber Essentials?

Cyber Essentials Cyber Essentials (CE) is a UK government scheme that organisations can (and in some cases, must) use to certify a basic level of both IT security awareness and cyber-health. It’s mostly interested in technical controls to mitigate specific, … Continue reading

Rate this:

Posted in Business, Security | Tagged , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Meltdown and Spectre – My update experiences on Windows

I’m intending to keep adding to this post as I find out new things and update more devices. This is primarily to aid me in tracking things I’ve done, what’s changed, and what’s still to do. Hopefully others might find … Continue reading

Rate this:

Posted in Hardware, Security, Windows | Tagged , , , , , , , , , , , , , , , , , , , , , , , | 1 Comment

Search through Pwned Passwords with PowerShell

Troy Hunt recently released over 300 million SHA1 hashes of passwords that his Have I Been Pwned website has been collecting. The site allows you to search the database to see if your passwords are included in those from many … Continue reading

Rate this:

Posted in PowerShell, Security | Tagged , , , , , , , | Leave a comment

No more excuses, sort out your IT management basics!

I am fed up. This is a bit of a rant, but with good reason: companies and services that I and all of us pay good money for are not being managed properly. I say: Enough, no more excuses. The … Continue reading

Rate this:

Posted in Business, Security | Tagged , , , , , , , , , , , | Leave a comment

Find out what’s really happening in your network with LogRhythm NetMon Freemium

I recently discovered that LogRhythm, as well as very a full-featured Security Intelligence Platform and SIEM, also provide a “freemium” Network Monitor.┬áThe “freemium” refers to that fact that the software is 100% free, full-featured and not time-limited, but is capacity-limited. … Continue reading

Rate this:

Posted in Networking, Security | Tagged , , , , , , , , , , , , , , , | Leave a comment

PowerShell Transcription to a file share breaks everything, and how to fix it

There’s been a bit of noise about PowerShell-based malware recently, and given the “assume breach” security mindset, I thought it was about time I enabled some of the PowerShell logging features in Windows. The basis behind “assume breach” is that … Continue reading

Rate this:

Posted in PowerShell, Security | Tagged , , , , , , , , , , , | Leave a comment

Collect user and group SIDs and names from Active Directory

Ever found yourself looking through the Access Control List of a file/folder/share and mixed in along with the group names (hopefully not user names!) you see some SIDs? These look something like S-1-5-21-0123456789-0123456789-0123456789-0123. These are the Security IDs of deleted … Continue reading

Rate this:

Posted in PowerShell, Security, Windows | Tagged , , , , , , | Leave a comment