ThreatLocker Administration Guide

    Exploitation of SolarWinds Orion Software

    On a quiet day, security is a challenge to digest. The list of latest breaches seems to never end. Cybersecurity professionals are expected to digest and implement a plan for the various...

    Read more

    Does Your MSP Provide Zero Trust Security?

    Businesses today are actively looking for robust cybersecurity protection to keep up with the rapidly evolving cybersecurity landscape.

    Read more

    Massive Spying Campaign Affects Google Chrome Users

    In February of this year, Google removed over 500 malicious plugins from the Chrome store which stole data from nearly 1.7 million users.

    Read more

    Australia Faces Wide Spread Cyber Attack

    Prime Minister Scott Morrison has spoken about a major cyber attack.

    Read more

    How Ragnar Locker Ransomware Evades Threat Detection

    Ransomware gangs have shown no sign of slowing down as more sophisticated and complex attacks are developed to evade traditional security solutions such as antivirus, firewalls, and...

    Read more

    Why Threat Detection Isn't Enough

    One of the biggest challenges IT Professionals face today is establishing the right security foundation for their organization.

    Read more

    Visibility and Control at the Application Layer

    In the past, the axiom, “humans are the weakest link,” was the battle cry of many cyber security professionals. Users, that is, non-security employees, were constantly doing “dumb”...

    Read more

    How Insider Threats Pose A Major Security Risk

    Historically, data breaches that make the news are typically carried out by outside attacks, however; the frequency and cost of insider-related cyber attacks have increased over the last...

    Read more

    Maze Ransomware Attacks Are Increasing

    A new strain of ransomware known as Maze is disrupting organizations around the world.

    Read more

    How to Protect Remote Workers From Cyber Threats

    Over the last month, we have observed a major shift in the way businesses and organizations communicate internally. As millions of new users are introduced to remote-collaboration tools,...

    Read more

    Beware of Federal Stimulus Package Scams

    The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with the Covid-19 news cycle. While many of...

    Read more

    How Safe is Zoom?

    Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing software applications on the...

    Read more

    The Hidden Dangers of Chrome Extensions

    While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google...

    Read more

    Hardening Windows 7 after January 14th, 2020

    The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the...

    Read more

    Why Small Businesses Have Become Targets of More Cyber-Attacks Than Large Enterprises

    Thousands of computers that belong to customers of managed services providers (MSPS) have suffered from ransomware attacks over the last year. Often times, this begins with a phishing...

    Read more

    Deploy ThreatLocker using Group Policy

    ThreatLocker MSI download Download ThreatLocker MSI from https://portal.threatlocker.com

    Read more

    ThreatLocker Administration

    ThreatLocker Administration

    Read more

    Manage Computers

    Manage Computers ThreatLocker gives you the ability to manage organization computers.

    Read more

    Working with Computer Baseline

    Working with Computer Baseline Computer Baseline is what is installed on a computer when ThreatLocker agent is installed. You don’t need to manually figure out what is running on the...

    Read more

    ThreatLocker Administration

    ThreatLocker Administration

    Read more