Password best practices controversy

07. December 2017 Technical 1
Last year, Microsoft published this guidance on passwords, which contains some advice that departs from traditional best practices. For example: Eliminate character composition requirements (e.g. multiple character types @, 2, A, b) Eliminate mandatory periodic resets (do not enforce expiry) The reasoning is based on Microsoft’s research, and the fact that they see billions of ...

How to Encrypt your Hyper-V Guest VM’s using the GUI

27. July 2017 Technical 0
Encrypting guest virtual machines is another layer of protection you can add in Hyper-V. Why would an admin want to do this? Because while encrypting the Hyper-V Host itself can protect against stolen physical disks, enabling BitLocker inside your virtual machines protects against stolen virtual disks as well (e.g. if an attacker were to gain access to an ...

How to Encrypt your Hyper-V Host Server using the GUI

20. July 2017 Technical 0
Full disk encryption is becoming more important in the SMB.  I recommend this for every Windows 10 Pro PC, and also for your Windows Servers. Small businesses often have a single physical Hyper-V host server, maybe two. And these are usually located in a network closet or mechanical room, in a small office space.  These ...

How I advise my clients on compliance & security

29. June 2017 Business, Technical 1
Information Security is becoming more and more important in today’s world. Here in the North America (including Canada and the US), we have several laws that require us to meet certain compliance requirements as it relates to Information Security for various industries.  Other nations, such as those belonging to the European Union, face these challenges as ...

My Essential Checklist for Settting up any New Windows 10 Pro Device

01. June 2017 Technical 0
This post features the things I do when setting up any (personal) Windows 10 Pro device, whether it’s for myself, my family members, clients, or anyone really. I usually do these things with security / compliance in mind–but some of it comes down to preference (I think the differences between these will be obvious). Let me share ...

5 Tips to Help Tighten your Security Using BIOS/UEFI

18. May 2017 Technical 0
In the olden days of PC’s, BIOS or “Basic Input-Output System” was something only the nerdy computer geeks were aware of, and the typical user never really went in there, or ran any kind of updates for it, unless explicitly instructed to by a support professional. Usually getting into BIOS is achieved by pressing “Delete,” ...

Password best practices

04. May 2017 Business, Technical 0
Some people say passwords are dead. I don’t know if I 100% agree with that, since in actual fact and practice, we still rely on them heavily to secure access to our personal information online. The idea behind these “passwords are dead” sentiments is that a single factor of authentication is no longer “enough” on it’s own. ...

How to enable 2-factor or multi-factor authentication (2FA or MFA)

27. April 2017 Technical 1
Enabling a second factor for authentication is an important (and often very easy) thing to do.  Usually this can be accomplished in just a few clicks for most websites and cloud services. It is highly recommended that you take the time to do this, especially for any accounts that are tied to online banking, financial institutions, and ...