How to secure your remote desktop server with GPO

imagesRemote Desktop Services is a great way to provide remote access to employees who travel, or it can even be used as a primary use of computing using thin clients. When you have multiple employees connecting to a remote desktop server, you will need to take the appropriate steps to secure the environment, just like you would a normal workstation .  This includes but not limited to installing anti-virus , limiting the ability to install software without administrative privileges, as well as accessing areas of the system they shouldn’t be able to.  In this article, we will specifically talk about how to lock down your RDS session using group policy, WITHOUT having that GPO apply to the employees regular workstation. Continue reading


How to secure your network with Watchguard’s web content filter?

web-securityIf your an systems admin for a network and responsible for the overall security of your environment, then I’m sure at one point in your career you’ve heard “I don’t know how I got this virus, I just went to and POOF! Porn pop-ups starting appearing”  If so, it may be a sign that you have users that like to stroll around sites that they probably shouldn’t visit during normal business hours.  If that’s the case, then it may be time to look into implementing some type of web content filter in the environment that will block access to these types of sites. In my experience, this is a very simple task with Watchguard XTM firewalls and will give you some great visibility into your network that you normally wouldn’t get with other firewalls right out of the box.  So what’s involved? Continue reading

How to encrypt your hard drive with TrueCrypt

Encrypt-hard-driveIn today’s world, there is no such thing as “too much security”.  OK, maybe there is but taking a few extra precautionary measures to protect sensitive data helps me sleep a little better at night.  I don’t know about you, but I keep A LOT of data stored locally on my laptop.  Granted I back it up frequently, but what would happen if I left my laptop at a clients site, or if it was stolen?  Anyone with a password cracking utility can easily get past my Windows credentials and access my data, or even take my hard drive out of the laptop, and attach it as a external disk to their personal laptop.  So how do you prevent this from happening? Simple.  Continue reading

What’s your disaster recovery plan?


disaster-recovery-planDisaster recovery is often an area that doesn’t get as much planning and attention as it should. Most IT departments and smaller outsourcing firms are so busy constantly putting out fires, that the process of actually testing if the data can be recovered almost never happens. Another problem I see often is that the business owner usually has a completely different set of RPO’s (recovery point objectives) and RTO’s (Recovery Time Objectives) in mind than IT has. For most companies, the days of just doing 1 backup at the end of the business day just doesn’t cut it anymore. Staff expect their data to always be accessible, and when something happens to it, they expect to get a recent copy back fast. So what does all this mean, and what should you do as a business owner to make sure your companies most valuable asset (your data) is protected and recoverable when you need it most?

Continue reading