Home > Resources > System Admin Guide to a Secure Network

SOHO System Admin Guide to a Secure Network

Articles

NAS
Network Attached Storage - A Secure File Server You Can Set Up in One Day

Easy solution for a secure file server for SOHO you can implement in one day.

Cyber Security | Tech Tips

Panduit RJ-45 Block Out Device
Physical Security Tips

Simply physical security controls to secure your network.

Cyber Security | Tech Tips

Wi-Fi
Wi-Fi is Ubiquitous, Yet Many Businesses Neglect Security

Simple steps to secure your wireless network from cyber criminals.

Cyber Security | Tech Tips

USB Storage Device
Data Breach Is Costly. Prevent Data Exfiltration.

Prevent data exfiltration by disabling data transfer on USB ports on your endpoints.

Cyber Security | Tech Tips

Block Malicious Ad Servers

Block malicious ad servers with HOSTS file.

Cyber Security | Tech Tips

Set Up Enforced TLS Encryption

Enforced TLS encryption for a persistent and secure email connection - 24x7.

Cyber Security | Tech Tips

What is an Email Message Header?

What is it and how to access email message headers.

Cyber Security | Tech Tips

Analyzing Email Message Headers

How to check if an email message was encrypted by analyzing its message header.

Cyber Security | Tech Tips

Mobile Device Policy

Secure your mobile endpoints with Office 365 Mobile Device Policy.

Cyber Security | Tech Tips

...
Smartphone Stolen? Wipe It - Remotely

Safeguard your data with remote device wipe & data delete.

Cyber Security | Tech Tips

7-Zip File Encryption

File encryption with 7-Zip file archiver utility.

Cyber Security | Tech Tips

Disaster Recovery
Hot, Warm, and Cold Data Backup

Implement a hot, warm, and cold data backup strategy for a comprehensive disaster recovery plan.

Cyber Security | Tech Tips

Is Your Network Printer/Copier a Security Breach Waiting to Happen?

Network printer and copier security best practices.

Cyber Security | Tech Tips

Are Your Sensitive Emails Sent Securely?

Ways to check if your sensitive emails are secure with the use of TLS encryption.

Cyber Security | Tech Tips

USB Thumbdrives
Self-Encrypting Portable USB Drives

Alarming statistics show employees fail to follow best practices to protect USB hard drives. Is using USB drives a risk for your organization?

Cyber Security | Tech Tips