Keeping Your Gmail and iCloud Accounts Secure: A Guide to Spotting Suspicious Logins

One of the easiest ways for cybercriminals to compromise your information is by gaining unauthorized access to your email and cloud accounts. Both Gmail and iCloud are primary targets due to their widespread use and the plethora of information stored within them. At Critical Path Security, we're here to ensure that your data remains uncompromised. We recommend that all our clients regularly monitor their accounts for suspicious logins and ensure that two-factor authentication (2FA) is enabled. To help in this endeavor, we've simplified the process for you with a step-by-step guide for both Gmail and iCloud. Checking Gmail for Suspicious Logins: Login to Your Account: Visit Gmail and log in. Access Google Account: On the top-right corner, click on your profile picture and select "Manage your Google Account." Navigate to Security: From the left pane, select "Security." Review Recent Activity: Under the "Your devices" section, you can see the devices…

Comments Off on Keeping Your Gmail and iCloud Accounts Secure: A Guide to Spotting Suspicious Logins

Setting Up Password Policies in Active Directory: A Guide by Critical Path Security

Establishing a Strong Password Policy Protecting your network starts with a robust password policy. With Microsoft Active Directory, you can utilize Group Policy to dictate various password criteria like complexity, duration, and size. Locate the default domain password policy at: Group Policy object (GPO) -> Computer configuration -> Policies -> Windows Settings -> Security Settings -> Account Policies -> Password Policy. Since Windows Server 2008, you can implement detailed policies for specific organizational units through Active Directory Administrative Center (DSAC) or PowerShell. NIST's Password Recommendations The National Institute of Standards and Technology (NIST) provides Digital Identity Guidelines, which emphasize: Password Complexity and Length: Contrary to forcing numerous symbols, NIST suggests promoting lengthy passwords or passphrases, ideally up to 64 characters. Password Duration: Instead of regular password changes, NIST now advises changing passwords only if a security threat is perceived. Avoid Easily Guessable Passwords: Steer clear of simple patterns, default passwords,…

Comments Off on Setting Up Password Policies in Active Directory: A Guide by Critical Path Security

CISO Advisory Services: A Deeper Dive into the Selection Process Using the McKinsey 7-S Framework

At Critical Path Security, we recognize the pivotal role of the Chief Information Security Officer (CISO) in today's businesses. Our CISO advisory services are designed to provide the strategic oversight and cybersecurity expertise that companies require, without the need for a full-time commitment. This service is especially beneficial for organizations that may not have the resources to staff a full-time CISO but understand the importance of cybersecurity leadership. The Vital Role of a CISO In the realm of cybersecurity, a CISO is more than just a role-it's a necessity. This senior-level executive is responsible for shaping and steering an organization's strategy to protect its most valuable digital assets. At Critical Path Security, our focus is on providing a CISO's strategic oversight, including the establishment of cybersecurity policies, management of risk, and ensuring compliance with evolving regulations. Expansive Responsibilities of a CISO Our CISOs at Critical Path Security carry a broad…

0 Comments

Uptick is Phishing from SharePoint and Teams: What you should know. What we’re doing about it.

We hope this message finds you well. We wanted to bring to your attention an emerging security concern that has been affecting a number of Office365 users. There has been a significant uptick in phishing attempts that seem to originate from legitimate SharePoint links and Microsoft Teams chat requests. These deceptive attempts are the result of compromised Office365 accounts. To ensure the security of your data and prevent your employees from falling victim to such scam emails, it's crucial to understand and recognize the warning signs. Here are the clear red flags to watch out for: Unknown File Sharer: If you cannot identify who shared the file with you, it's best to err on the side of caution. Always avoid opening files from unknown or suspicious sources. Vague File Details: If a file is shared without any prior context or an explanation of its content and purpose, consider it a…

Comments Off on Uptick is Phishing from SharePoint and Teams: What you should know. What we’re doing about it.