Remove Backup Remove Linux Remove Policies Remove Security
article thumbnail

Passwords and Policies | Roadmap to Securing Your Infrastructure

Linux Academy

Welcome back to our weekly blog post as we look at how to better secure your infrastructure. This week, we’re going to continue chipping away at these problems with additional layers of protection, including a password policy. Policies are our foundation. Consequences for not following the policy.

article thumbnail

Using Secure Configurations | Standardize Your Security

Linux Academy

This week, we’re discussing secure configurations, and why they matter. Our friends at the Center for Internet Security (CIS) listed “Secure Configurations” as the No. 5 most important security control on this year’s Top 20 hit list. Of course, I need to securely configure my devices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Achieve scalable cyber resiliency in the cloud during an age of exponential data growth

CIO Business Intelligence

Compounding the complexity of enabling data resiliency and business continuity are the many different platforms (Unix, vSphere, Windows, Linux, etc.), Even more concerning, these disparate siloes can create points of vulnerability, both from a security and business continuity perspective.

article thumbnail

User Account Review | Roadmap to Securing Your Infrastructure

Linux Academy

One of the topics you may not often think of as being all that important to security is user accounts on systems. At a previous employer, I performed many security-focused audits for organizations needing to meet regulatory compliance. Data Backups. that user accounts are often a neglected topic. Identifying unused accounts.

article thumbnail

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure.

article thumbnail

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one.

article thumbnail

Weekly Update 5-20-2019

Linux Academy

Improved security. Great news for all of our Linux Academy students; Red Hat Enterprise is already available to try out in Linux Academy’s Cloud Playground! We have more information on t he release in general and all the new features in our podcast Linux Action News and episode 105. Configure an Account Lockout Policy.

Linux 60