Author's posts

Mar 29

File Screens Don’t Stop Ransomware – Part 2

File screens don’t stop ransomware, but firewalls do. In my last post, I suggested that disabling shares in response to an unauthorized file extension was a bit extreme.  After discussing this with other members of the community, I now believe that blocking access is the only real solution. If ransomware created an encrypted copy of …

Continue reading

Mar 24

Use File Screens to Stop Ransomware – Part 1

Ransomware has become the hot-topic for 2016.  It is bad enough that this crypto malware can encrypt workstations but the risk of one infected user locking down the file server is especially scary. This article details how you can use Server 2012 file screens to prevent crypto locker from taking over your file server.  There …

Continue reading

Mar 20

Permission to Phish

This is a short speech I gave on the topic of phishing using a composite of real customers.  I briefly explain what it looks like and the potential consequences.

Dec 21

If It’s Worth Doing, It’s Worth Doing Right

Have you ever hired someone to work on your house and felt you could have done a better job yourself?  Was the handyman unskilled, lazy, or both?  Maybe he was just going too fast.  Or maybe he just simply didn’t know any better. This is an all too common scenario in the profession of information …

Continue reading