• The Importance of an Incident Response Plan

    This guide has been made by Myself & referencing UK NCSC references please visit NCSC for more info and to draw & practice your own incident/response plan https://www.ncsc.gov.uk/ Why have an incident response? Take it as a guide. It shows how and who will make the decisions during a cyber-incident. Developing an incident response plan…

  • Sentinel – Detecting suspicious Files Downloads folder

    Benefits & Recommendations Technical requirements Sentinel Query – Downloads folder – Suspicious files detected We can observe as soon we ran the query we detect 2 executables worth looking We can deem the possible executables as PUA ( potentiall unwanted apps) and something that would be worth monitoring Setup web companion executable detected by the…

  • MDR – Huntress case study

    Is huntres for me? Start your trial if you are convinced that that is the case using the next link https://www.huntress.com/start-trial We have prepared a compressive pointers for combining huntress with other platforms or methodologies to achieve the best cybersecurity resilence . Huntress is the perfect fit for you if taken advantage of SIEM ,…

  • AD /AZAD Password Protection deployment

    Time to get a Darkweb password breach monitoring tool Dark Web password breach monitoring tools are essential for proactively identifying compromised credentials and preventing unauthorized access to your systems. These tools continuously scan dark web forums, marketplaces, and other hidden channels for stolen passwords and alert organizations when employee or customer credentials have been compromised.…

  • Implementing DHCB1596 – Office 365 Tenant

    In an era where protecting sensitive health information is paramount, the NHSmail Secure Email Standard plays a crucial role in safeguarding data within the UK’s healthcare system. Managed by NHS Digital, the DHCB1596 standard ensures that emails exchanged between NHS organizations, as well as with other accredited public sector bodies, comply with stringent security protocols.…