Exploitation of SolarWinds Orion Software
On a quiet day, security is a challenge to digest. The list of latest breaches seems to never end. Cybersecurity professionals are expected to digest and implement a plan for the various...
Does Your MSP Provide Zero Trust Security?
Businesses today are actively looking for robust cybersecurity protection to keep up with the rapidly evolving cybersecurity landscape.
Massive Spying Campaign Affects Google Chrome Users
In February of this year, Google removed over 500 malicious plugins from the Chrome store which stole data from nearly 1.7 million users.
Australia Faces Wide Spread Cyber Attack
Prime Minister Scott Morrison has spoken about a major cyber attack.
How Ragnar Locker Ransomware Evades Threat Detection
Ransomware gangs have shown no sign of slowing down as more sophisticated and complex attacks are developed to evade traditional security solutions such as antivirus, firewalls, and...
Why Threat Detection Isn't Enough
One of the biggest challenges IT Professionals face today is establishing the right security foundation for their organization.
Visibility and Control at the Application Layer
In the past, the axiom, “humans are the weakest link,” was the battle cry of many cyber security professionals. Users, that is, non-security employees, were constantly doing “dumb”...
How Insider Threats Pose A Major Security Risk
Historically, data breaches that make the news are typically carried out by outside attacks, however; the frequency and cost of insider-related cyber attacks have increased over the last...
Maze Ransomware Attacks Are Increasing
A new strain of ransomware known as Maze is disrupting organizations around the world.
How to Protect Remote Workers From Cyber Threats
Over the last month, we have observed a major shift in the way businesses and organizations communicate internally. As millions of new users are introduced to remote-collaboration tools,...
Beware of Federal Stimulus Package Scams
The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with the Covid-19 news cycle. While many of...
How Safe is Zoom?
Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing software applications on the...
The Hidden Dangers of Chrome Extensions
While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google...
Hardening Windows 7 after January 14th, 2020
The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the...
Why Small Businesses Have Become Targets of More Cyber-Attacks Than Large Enterprises
Thousands of computers that belong to customers of managed services providers (MSPS) have suffered from ransomware attacks over the last year. Often times, this begins with a phishing...
Deploy ThreatLocker using Group Policy
ThreatLocker MSI download Download ThreatLocker MSI from https://portal.threatlocker.com
Manage Computers
Manage Computers ThreatLocker gives you the ability to manage organization computers.
Working with Computer Baseline
Working with Computer Baseline Computer Baseline is what is installed on a computer when ThreatLocker agent is installed. You don’t need to manually figure out what is running on the...