Posts

Showing posts from October, 2024

Backups & Data Recovery

  These are regular backups that will be needed when data losses occur due to hardware failures, malfunctioning software, human mistakes, and even the ever-increasing number of hackers. That's assuring business continuity and compliance with the laws in existence. The effective strategy includes both full and incremental backups in a mixed style. Cloud storage offers off-site protection, while using local storage, such as external hard drives, allows for faster recovery. As an example, a business might perform weekly backups to the cloud and daily incremental backups to both cloud and local devices. Cloud storage offers scalability and redundancy, while local storage enables rapid recovery. Also, regularly testing backups offers a chance to perform trial Often   when data is erased the space it took up is only shown as available; the data itself is not actually gone. Recovery techniques entail using data recovery software to look for and reconstruct deleted file traces on st...

Configuring Microsoft Defender Firewall

Image
                                                     Whitelisting IP Address Using Microsoft defender click on advanced settings which will give you more control over your inbound and outbound rules.   in advanced settings in the left hand plane click on inbound rules and then select new rule  Open Learn Access Control Lists screenshot - Completed 

INTRUSION DETECTION SYSTEMS & ACCESS CONTROL LISTS

  Intrusion detection systems also known as (IDS) are essential for protecting your network from being attacked by malicious individuals. they behave in a manner of security guards always monitoring the traffic from your network looking for suspicious patterns and threats which are commonly known. When any malicious activity is detected the IDS will notify you which will allow you to perform some sort of action before damage to your system can occur. There are two different types of IDS systems host based and network based. Host based detection systems better known as (HIDS) is directly installed on individual devices that are connected to the to your network. HIDS act like body guards for each machine and detect packets that come from within the network and other threats originating from host ensuring that the traffic from the host is not affected with malware trying to spread it across the system. Network based intrusion systems on the other hand also known as (NIDS) i...

WHY YOU NEED A FIREWALL TO PROTECT YOU

  Imagine a security guard standing watch at the entrance to your computer, carefully screening all incoming and outgoing network traffic. That's essentially what a firewall does. It's a crucial piece of software that protects your PC from unauthorized access and malicious activity. monitoring traffic : the firewall monitors traffic from the network for both incoming and outgoing packets. data is examined for anything suspicious. enforcement of rules : firewall can be configured with specific rules that determines what kind of traffic can be blocked. the rules are based on on factors like source and destination application and port number. application control : a firewall can control the types of application that can be allowed to access the internet. port blocking : ports on the network are like door to you computer. the firewall can block specific ports to prevent access . intrusion prevention : firewalls have features which are advanced that can detect and restrict attack...