Search results

  1. Rick Butler

    Web Browser

    I use Edge for my primary school management, while I have profiles for Chrome for secondary work, as well as personal or other activities. I really try not to cross pollinate work, home, and such. As for not having a cell phone, I know that's not accurate - since the CIN motley crew over...
  2. Rick Butler

    Phishing - The Top Attack Vector

    Defender P2 is a great platform for total malware management. Only thing above that is XDR which adds in the SIEM and SOAR. Too much for our school, but good for bigger environments.
  3. Rick Butler

    Web Browser

    I use a combination of Edge and Chrome. But if you need something with the old JRE built in, Pale Moon is a good alternative. For mobile, I'm pretty much exclusively using Brave for its anti spyware capabilities, along side of SurfShark VPN.
  4. Rick Butler

    Phishing - The Top Attack Vector

    I think we see a good phishing email that gets spread through our organization, perhaps every few weeks. Lately, I think, with a few exceptions, our students and staff are getting better at identifying and flagging them in Exchange, while I end up going into the MS Defender console and...
  5. Rick Butler

    The Consequences of Being Stubborn

    Thanks for that. I do try to be interesting when I write something- if not entertaining.
  6. Rick Butler

    Password Manager

    I don't know that CompTIA would provide any specific platform managers, given their vendor-neutral perspective. I myself have used 1Password in the past, but stopped using it since it's a non-US company that manages it - and I tend to restrict my security tools to things developed and managed...
  7. Rick Butler

    The Consequences of Being Stubborn

    Use them as you will. Actually, I like to think of myself as a prolific writer. I've written both poetry and prose, fiction and non-fiction, serious and silly over the course of my life. I also wrote for MCP Magazine/Redmond/1101 Communications from 2000-2007, writing commentary, product...
  8. Rick Butler

    The Consequences of Being Stubborn

    Wow. Okay, y'all....so.... I had an old First Sergeant back in my Army days offer this very sage wisdom: "Don't speculate or make assumptions about the things of which you are unaware. " But because @Trevor Chandler had to step up and take an unprovoked shot across the bow, I would feel...
  9. Rick Butler

    CIN Sneak Peek - CloudNetX CNX-001

    While Zero Trust does carry an attitude of cynicism in that "assume breach" is a key component, I feel I must apply the same methodology that you do in handing out tardy slips during seminars.
  10. Rick Butler

    CIN Sneak Peek - CloudNetX CNX-001

    Likely story...
  11. Rick Butler

    Word of the Day: Skullduggery (Wi-Fi Leapfroggery)

    Well, with respect to the Coffee Maker:
  12. Rick Butler

    CIN Work Zone Ahead!! 🚧👷

    Suddenly, this comes to bear:
  13. Rick Butler

    CIN Work Zone Ahead!! 🚧👷

    I'm going to reference (but not link) the song Orange Barrels by Todd Yohn and featured on the Bob and Tom radio show...
  14. Rick Butler

    Old CASP+ certs will be rebranded SecurityX on December 17, 2024

    I reserve the right to vary my signatures. ;)
  15. Rick Butler

    Antivirus Software

    Already been done in this thread. Fix the user.
  16. Rick Butler

    Basic Cybersecurity Hygiene

    A logon that is based on factors in real-time, such as logon location + this/that device + time of day - like an aligning of the planets before you get to log on.
  17. Rick Butler

    Word of the Day: Skullduggery (Wi-Fi Leapfroggery)

    They don't even need to be in range of your network - just hacking an adjacent network is all that's needed The Daisy Chain Attack
  18. Rick Butler

    Old CASP+ certs will be rebranded SecurityX on December 17, 2024

    I was getting conflicted information about that. But I'd be glad to take that title on - even though I'm going to re-test next year.
  19. Rick Butler

    Basic Cybersecurity Hygiene

    The principles rules of Zero Trust: - Always Verify - Least Privilege Access - Assume Breach But to add: - Context-aware authentication - Micro-segmentation - Strong encryption methods - Automated threat response and remediation /r
  20. Rick Butler

    AI Jesus Will Hear Your Confession

    I'm sure Christ would have had the forward thinking to know what would come up 2000 years later. Might explain some of that prophecy in Revelation where it's said that the Two Witnesses would be killed for the entire world to see. Mark Twain once said that a lie can run halfway around the...