PowerShell – script for monitoring website availability

PowerShell – script for monitoring website availability
Sometimes we want to know the availability of web applications. To do this, we need a system that will query specific addresses at regular intervals. But what if such a system doesn't exist, and we need to verify it for testing purposes? I’ve prepared a short and simple script for such needs, which, given a list of…

What are penetration tests?

What are penetration tests?
The fact is that we are increasingly dependent on systems. The threats associated with cyberattacks are becoming more real. For both companies and public institutions, one of the key elements of data and IT system protection is penetration testing, also known as “pentests.” What lies behind this term, how does such a process work, and why is…

How to secure your IoT devices: 6 practical Steps

How to secure your IoT devices: 6 practical Steps
IoT (Internet of Things) devices bring incredible convenience and functionality, but they also come with risks since they are connected to the Internet, which opens the door to potential threats. To protect your data, privacy, and devices, it is essential to understand and implement the following steps that will help you secure your assets. 1. Change default…

Is a VPN in a company enough security?

Is a VPN in a company enough security?
In today's world, where cyber threats are becoming more complex and widespread, many companies have or are just deciding to implement a VPN as a key component of their security strategy. A VPN offers a number of benefits, such as encryption of data between a company and an employee or between company branches and anonymity on the…

How to secure KeePass with YubiKey

How to secure KeePass with YubiKey
Obecnie mamy coraz więcej kont w serwisach internetowych. Nie sposób zapamiętać hasła do wszystkich kont, w szczególności jeśli chcemy aby nasze hasła były odpowiednio długie, losowe i unikalne. Tutaj z pomocą przychodzą nam menadżery haseł. Jakiś czas temu napisałem wpis why and how to use KeePass. The password database file is, of course, password-protected using strong encryption,…

10 steps to have better secured email mailbox

Email is today’s essential work tool. It’s hard to imagine life without email. We use it both at work and in our personal lives. However, this fact also poses a threat to us. The number of email-related scams continues to rise, which means that if we don’t take additional steps to secure ourselves, we’ll be at risk.…

Restore OneDrive files from removed account

Restore OneDrive files from removed account
Have you ever deleted an Office365 account without making a backup? And have you ever had to recover files from that account after 2 months? An Office365 user account can be recovered up to 330 days after deletion from the admin panel. But what happens after that time has passed? Today, I will present a simple way…

External email warning rule – Exchange Online

External email warning rule – Exchange Online
Many companies choose to include in the first line of an email a message indicating that the email comes from an external source. Such a notification might look like this: Adding such a banner at the top of an email serves as a reminder to employees to verify the sender, message content, and attachments. You can customize…

Protection against advertisements in the browser

Ads and malicious content in a web browser can be not only annoying but also dangerous for users. They can invade privacy by tracking activities, slow down computer performance, and even infect it with malicious software. Therefore, it's important to know how to protect yourself from them. Here are a few ways to enhance the security and…