In this Ask the Admin, Russell Smith explains how Controlled Folder Access can help protect users against ransomware.

with 0 Comments by Russell Smith
In this Ask the Admin, Russell Smith explains how Controlled Folder Access can help protect users against ransomware.
with 0 Comments by Russell Smith
Russell Smith explains how attackers target businesses indiscriminately and outlines some steps for securing your devices.
with 0 Comments by Aidan Finn
Take a look at the steps which, when taken together, should minimize your risks of being successfully attacked by ransomware such as WannaCrypt, CryptoLocker, and a plethora of other variants that are ravaging businesses of all sizes around the world.
with 0 Comments by Aidan Finn
Aidan Finn shows you how to deploy Microsoft Anti-Malware to Azure virtual machines at scale with scanning exceptions and schedules using PowerShell.
with 0 Comments by Aidan Finn
Looking into unified threat management? Check our review of WatchGuard XTM, which provides security and connects on-premise and (hybrid) cloud services.
with 0 Comments by Russell Smith
It’s time to update those legacy apps! Learn about EMET 4.1 and how it can be used to secure legacy applications running on WS2012 R2 and Windows 8.1.
with 0 Comments by Aidan Finn
Is installing antivirus on your Hyper-V hosts necessary? Answer: That depends. Learn more, including how to configure antivirus scanning exceptions.
with 0 Comments by Russell Smith
Learn more about putting antivirus on servers – which just might help prevent or limit the damage caused by virus outbreaks on your network.
with 0 Comments by Russell Smith
Microsoft’s free Security Essentials product isn’t as comprehensive as paid products. Find out whether it’s worth switching to a paid security solution!