The Russian proverb, ‘Trust, but verify’ was made famous by President Ronald Reagan during the height of the US/Soviet arms race. At the time, this was meant to suggest the need for validation, even when there was trust between parties. This phrase was very appropriate as it allowed the two superpowers to become more friendly, but left room for validation that changes were truly being made. Validation begets trust and the situation improved.
In the last few months, my view of technology has changed significantly. The past has been filled with data center strategy discussions and complex cloud conversations. We all know this is where the world is taking us from the IT Transformation strategy…but, what is your DIGITAL Transformation strategy?
--- A blog post from Paul Wetter on behalf of Cyber Advisors
Administration of Configuration Manager is more than a full-time job by itself. Maintaining some sort of documentation for the environment that can be given to management or stored internally can be an all together second job. So, why continue a manual task of creating documentation when you could automate it and have an extensive and detailed document created in minutes instead of hours.
It is not every day I need to add users in bulk to Active Directory, but when I do, I usually need to write a script that can be quiet time-consuming. It just so happened that I came across a tool to make this process a little easier today. Its name is ADUC Tool, and it allows you to import users from a CSV file or build them based on pre-configured settings. The tool is based in PowerShell, but it has a GUI. While this is a no-frills option, it is free and is very customizable for any organization.
Topics: Tech Article
With all the security news recently of WPA2 wireless being broken with the KRACK attack methods, the Wi-Fi Alliance® has put together the next security standard called WPA3 that should do away with most of the insecurities of WPA2 and open wireless networks altogether. WPA3 is expected to arrive sometime in 2018.
Topics: Cyber Security
Managing windows servers might be getting an upgrade in the future as Microsofts “Project Honolulu” is being developed to add a web UI for it. This has the potential to be a game changer for customers that were on the verge of using HyperV Core but didn’t want to lose the manageability of the full GUI. The goal of this platform is to pick up where the server manager lacked. In offering a Web-based solution it will be easier to use, and they are also releasing APIs for third-party developers to make use of. I would look forward to the actual release of this feature in late 2018, but in the mean time give the preview a try. If you have questions or have interest in Microsoft software, contact Cyber Advisors.
Cyber Security is an on-going battle and there isn't one best way to protect yourself. Because security is so important and there are many aspects to it, The Motherboard published a great comprehensive guide on how to not get hacked. This article is updated regularly and is great for just about everyone. If you have further questions regarding cyber security and how to better protect your self contact Cyber Advisors.