Videos
Vishing (short for voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone. While that makes it sound like an old-fashioned scam, vishing attacks have high-tech elements.
Follow these best practices to make sure all your remotely located Windows devices have the latest security updates.
As more employees work from home, it’s important to review your VPN settings and following the best guidance.
Compromising windows administrator accounts is always a key goal for attackers. You can help prevent that from happening with these best practices.
As the recent attack on Honda shows, anyone can be a victim of a ransomware attack. This advice will minimize your risk.
Every company has legacy systems, many of which provide vulnerabilities for attackers to exploit. Use this advice to help shut them out.
Companies that have disabled Windows Firewall might be missing out on some added network protection. Here’s how to set it up effectively.
These are the event logs that will help you identify malicious activity on your network.
Microsoft has rebranded and updated its tool to deploy security patches and new features.
Attackers still commonly use a vulnerability in older versions of Microsoft Office because many organizations left it unpatched. Did yours?
Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.
COVID-related attacks make it more important that you follow Microsoft’s advice to protect Microsoft 365 users and systems.
Attackers are using web shells to mimic legitimate files on web servers and infect them with malware. Here’s how to prevent it.
Targeted phishing attempts and updated malware are creating havoc for Windows admins in a hard time. Here are some tips to minimize the damage.
Some organizations are setting up split-tunnel virtual private networks to allow remote workers to connect to a Windows network. Follow these steps to minimize security risks.
More people are relying on videoconferencing software to do their jobs and chat with friends and family. This uptick in use highlighted some security concerns like “Zoombombing” and the lack of end-to-end encryption in popular video conferencing/...
Organizations that have been forced to make rapid changes to their Windows networks should take the time to review settings to make sure no doors were left open for attackers.
Many organizations are using Microsoft’s RDP to set up remote workers. Use these tweaks to better protect those connections.
Microsoft Threat Protection can help admins monitor and secure much of a Windows network, but licensing requirements are confusing.
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from factual m...
With widespread mandated work from home policies due to the coronavirus, many employees are working remotely for the first time. In some cases, employers had never intended their employees to be remote-only, and they may lack key work from home tools...
Microsoft and Google are pausing Windows and Chrome updates, and Microsoft is offering remote access technology and advice.
Companies that are scrambling to support remote workers in the wake of the COVID-19 crisis need to address these security concerns.
All software has bugs, and some of those bugs are security flaws that can be exploited and turned into weapons. A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. Here's what you need to know.
Attackers are using tools and features built into Windows 10 to compromise systems and avoid detection. These tips will help shut them out.
Administrator accounts have wide access to data and systems. Here’s how to protect them from abuse or compromise.
Most phishing campaigns use links to malicious scripts that infect users’ devices. Here’s how to spot and prevent them from doing damage.
Computerworld Windows expert Preston Gralla and Executive Editor Ken Mingis answer viewers' questions about the latest Windows 10 release and other Windows-related topics. If you have a question, post it as a comment.
The U.S. Department of Defense had two final choices to award its Joint Enterprise Defense Infrastructure (JEDI) cloud computing contract: Microsoft and Amazon. Despite perception of Amazon’s frontrunner status, the D.O.D. awarded the $10 billion c...
See how to style your headlines, axis text, and more in your ggplot graphs with the R ggtext package. Download the data from Sharon's associated article: https://www.infoworld.com/article/3527449/add-color-to-your-ggplot2-text-in-r.html
Use these tools and techniques to protect important data from being exfiltrated from your Windows network.
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss critical compone...
In this Linux tip, learn how to use the ls command. The ls command is one of the most basic commands. It’s used to list files and it has some very useful options.
One of the largest tech trade shows, Mobile World Congress, canceled its convention just a few weeks before it was scheduled to begin. GSMA, the organization that puts on MWC, decided to cancel after a number of high profile vendors pulled out due to...
In honor of Valentine’s Day, we’re talking about technology we love. AI, 5G, edge computing, collaboration tools – all have people’s hearts racing. Watch as Michael Simon, writer for Macworld and PCWorld, and IDG TECH(talk) hosts Ken Mingis a...
Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it.
There's plenty of options to pick from when it comes to selecting a password manager. But why should you use one? Do you want something cloud-based or local? CSO Online writer J.M. Porup joins Juliet to discuss the ins and outs of password managers, ...
We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep web and dark web a...
Use these techniques to see if attackers have harvested authentication credentials from your Windows network.
It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" w...
Is 5G real? When should you upgrade? How will enterprises benefit and what are the costs and ROI? Analyst Jack Gold joins IDG TECH(talk) hosts Juliet Beauchamp and Computerworld's Ken Mingis to answer those questions and more to help you create your ...
IDC analyst and networking expert Brandon Butler joins Ken and Juliet to discuss networking trends, Wi-Fi versus 5G and how artificial intelligence and machine learning can simplify network management. They also discuss how enterprises are beginning ...
Foldables, 5G, new Android phone options – watch as Computerworld blogger (and Android expert) JR Raphael joins IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp to discuss what we can expect for Android phones in 2020.
Take stock of how people and devices access your network and block potential avenues of attack.
In this Linux tip, learn how to use the ssh-keygen command. It’s used to create a set of public/private keys that you can use in place of passwords to either log into a system or run commands remotely.
Learn how to turn code from Episode 41 into an interactive shiny Web app.
See how to search, filter, and sort tweets using R and the rtweet package. It’s a great way to follow conference hashtags. If you want to follow along with the optional code for creating clickable URL links, make sure to install the purrr package i...
Artificial intelligence and machine learning are being used even more these days. Watch as InfoWorld’s Serdar Yegulalp and IDG TECHtalk hosts Ken Mingis and Juliet Beauchamp discuss how AI and ML are being used and answer viewers’ questions.
Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.
Robotics Business Review senior editor Keith Shaw joins Ken and Juliet once again to talk CES 2020 and the future of robotics. Keith debunks the myth that robots will replace humans in jobs, and explains they'll actually be quite helpful in assisting...