A key part of an organization's ransomware-prevention strategy is creating Exchange mail flow rules that take action against messages that are likely to contain ransomware.
Backups aren't just the last line of defense against ransomware. If you know the signs, your backups can also help you stop a ransomware attack that is currently in progress.
A persistent thorn in Brien's side -- Hyper-V replication falling out of sync for no good reason -- seems to have fixed itself out of the blue.
Once universally loathed, UAC is now a very useful tool for blocking Windows security threats. Here's how to make sure you're using it appropriately.
A Microsoft Research project is expanding the capabilities of computer vision systems to help visually impaired users navigate everyday tasks.
Those with a business or enterprise subscription to Microsoft 365 have the option to create a policy that will greatly reduce the chances of a user becoming infected from a malicious e-mail.
Microsoft's go-to solution for anti-phishing protection is an anti-phishing policy. Here's how to create one in Microsoft 365.
Getting a new desktop looking and feeling like the old one used to take a long time, but modern backup applications have greatly streamlined the process. Still, there are a few things to keep in mind to avoid potential issues.
These are the top four privacy settings to check in your Windows device to make sure Microsoft doesn't collect any data you don't want it to.
To audit all of the personal data that Microsoft has collected from your PC usage habits, look no further than Windows 10's Privacy Dashboard.
A new Microsoft Word feature lets you insert a block of text (or other content) from a different file without leaving the document you're currently working on.
Visio is a handy tool for creating network diagrams, but it doesn't include every conceivable type of shape. Here's how to create your own custom shapes in Visio.
Sometimes the easiest fix for chronic Windows 10 problems is reinstalling Windows 10. Here's how to do it without erasing all of your files and apps.
The public cloud is mature and reliable. So why does Brien still run a bunch of physical servers out of his home? For a lot of good reasons that the cloud can't match, it turns out.
Ransomware is a lot more sophisticated now, attacking data on network drives and in the cloud. Before physically interacting with ransomware, take these precautions to stop anything outside the VM from getting infected.