Petya-Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware Don’t let your guard down just yet. While the threat of last month’s WannaCry ransomware has just about disappeared, a new threat is already on the rise. The cyberattack is believed to have hit its first targets in Ukraine. Going after the central bank, main airport as well as the Chernobyl nuclear Read More

square spamsentinel

Essential Tools – Patrolling IBM Domino Environments for Over a Decade

Essential Tools (ET) is an robust, Beacon award-winning server-based IBM Domino Administration tool designed to assist Domino administrators perform their tasks significantly more efficiently and also allow them to fulfill certain tasks that the infrastructure did not allow them to do so before. The robustness of ET stems from the basic architectural fact that the Domino Infrastructure information (Database, ACL, Read More

internet-security

Managing Access Control Lists to Improve Domino Security

An Access Control List is the front door of a Domino database.  It controls whether access to the database is allowed or denied.  After a user or server is able to access the database the Access Control List further dictates what actions may be taken, i.e. the ability to read particular documents, create documents, modify documents, tweak the database design and Read More

square spamsentinel

Domino Security Enhancement

Secure your Domino Environment with these quick and easy tips! With the New Year many of us are creating both professional and personal goals. Consider making a goal to fortify your Domino servers. There are some steps you can take to quickly and easily increase the security of your infrastructure. One setting that has baffled me over the years is Read More