New Horizons Dallas Blog

31 Oct 2017

Avoid individual-user permissions when building a folder environment (SharePoint)

As an IT professional, dodging administrative nightmares sometimes feels like a Choose Your Own Adventure book where any wrong turn can spell disaster. A surefire way to send yourself back to page one is setting permissions on an individual user level. Doing so creates unnecessary work for administrators and potential security issues. When user permissions are assigned individually, it becomes impossible to tell who has access to what, especially for deeply nested folders. As you design your...
0 Comments
Article rating: No rating

31 Oct 2017

Avoid individual-user permissions when building a folder environment (SharePoint)

As an IT professional, dodging administrative nightmares sometimes feels like a Choose Your Own Adventure book where any wrong turn can spell disaster. A surefire way to send yourself back to page one is setting permissions on an individual user level. Doing so creates unnecessary work for administrators and potential security issues. When user permissions are assigned individually, it becomes impossible to tell who has access to what, especially for deeply nested folders. As you design your...
0 Comments
Article rating: No rating

31 Oct 2017

Use Network Segmentation to prevent a full-access security breach (Networks)

In medieval times, wealthy Lords built stone walls around their fortresses to keep their castle safe—sometimes they even added a moat! For network security, segmentation is the equivalent of multiple layers of protective walls. The idea is that a hacker can never penetrate the entire system at once without setting off warning bells or hitting a wall. Network segmentation splits a flat network into many separate “sub networks” called segments. The initial, and most crucial, step toward...
0 Comments
Article rating: No rating

31 Oct 2017

Use Network Segmentation to prevent a full-access security breach (Networks)

In medieval times, wealthy Lords built stone walls around their fortresses to keep their castle safe—sometimes they even added a moat! For network security, segmentation is the equivalent of multiple layers of protective walls. The idea is that a hacker can never penetrate the entire system at once without setting off warning bells or hitting a wall. Network segmentation splits a flat network into many separate “sub networks” called segments. The initial, and most crucial, step toward...
0 Comments
Article rating: No rating

31 Oct 2017

Don’t forget to turn on a VPN when using open wifi connections (IT)

Doing some work at the local coffee shop and hopping on their free wifi sounds like a great deal until you think of the dangers of opening your laptop or mobile device to an open network. Wifi hacking is a prevalent, but avoidable, problem. When a device connects to an unprotected internet connection, the device immediately becomes vulnerable to infiltration. This often happens without the user even knowing! Once the hacker accesses the device, they can see any data being viewed, including...
0 Comments
Article rating: No rating
RSS
12345678910Last