SOHO Windows System Administrator's Guide to a Secure Network


remote work from home
Prepare Your IT Infrastructure for Quarantine Telework/Work from Home

Easy actionable solutions to quickly set up and prepare your team and your IT environment to support remote workers.

Telework | Tech Tips

Panduit RJ-45 Block Out Device
Physical Security Tips

Simply physical security controls to secure your network.

Cyber Security | Tech Tips

Wi-Fi is Ubiquitous, Yet Many Businesses Neglect Security

Simple steps to secure your wireless network from cyber criminals.

Cyber Security | Tech Tips

USB Storage Device
Data Breach Is Costly. Prevent Data Exfiltration.

Prevent data exfiltration by disabling data transfer on USB ports on your endpoints.

Cyber Security | Tech Tips

Block Malicious Ad Servers

Block malicious ad servers with HOSTS file.

Cyber Security | Tech Tips

Set Up Enforced TLS Encryption

Enforced TLS encryption for a persistent and secure email connection - 24x7.

Cyber Security | Tech Tips

What is an Email Message Header?

What is it and how to access email message headers.

Cyber Security | Tech Tips

Analyzing Email Message Headers

How to check if an email message was encrypted by analyzing its message header.

Cyber Security | Tech Tips

Mobile Device Policy

Secure your mobile endpoints with Microsoft 365 Mobile Device Policy.

Cyber Security | Tech Tips

Smartphone Stolen? Wipe It - Remotely

Safeguard your data with remote device wipe & data delete.

Cyber Security | Tech Tips

7-Zip File Encryption

File encryption with 7-Zip file archiver utility.

Cyber Security | Tech Tips

Disaster Recovery
Hot, Warm, and Cold Data Backup

Implement a hot, warm, and cold data backup strategy for a comprehensive disaster recovery plan.

Cyber Security | Tech Tips

Is Your Network Printer/Copier a Security Breach Waiting to Happen?

Network printer and copier security best practices.

Cyber Security | Tech Tips

Are Your Sensitive Emails Sent Securely?

Ways to check if your sensitive emails are secure with the use of TLS encryption.

Cyber Security | Tech Tips

USB Thumbdrives
Self-Encrypting Portable USB Drives

Alarming statistics show employees fail to follow best practices to protect USB hard drives. Is using USB drives a risk for your organization?

Cyber Security | Tech Tips

NAS - A Secure File Server You Can Set Up in One Day

Easy solution for a secure file server for SOHO you can implement in one day.

Cyber Security | Tech Tips