How-Tos

ransomware

supply chain

What is ERP? Key features of top enterprise resource planning systems

Enterprise resource planning (ERP) software standardizes, streamlines and integrates business processes across finance, human resources, procurement, distribution and other departments. Here's what you need to know about these key IT...

ifcr 021 thumb3
video

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

cssg 014 thumbnail
video

Updating Spectre, Meltdown and Foreshadow mitigations

Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.

8 ingredients dr
video

8 ingredients of an effective disaster recovery plan

How to keep your business running in the event of an emergency or disaster.

nwht 018 thumb
video

Linux tip: How to use the hostnamectl command

In this Linux tip, we look at the hostnamectl command. It’s a command that provides information on a particular system – including but not limited to its hostname – and even allows you to make some changes.

cssg 013 thumbnail
video

How to harden Windows workstations and servers from attack

Use these basic settings to make it harder for attackers to Windows hardware.

nwht 017 thumb2
video

Linux tip: How to use the pstree command

In this tip, we look at the pstree command. It allows you to get a listing of running processes that clearly indicates the relationship between them.

thumb
video

How to defend Office 365 from spear-phishing attacks

Configure Office 365 to detect email-delivered malware.

thumb
video

R tip: Write your own RStudio addins

This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE

student books with apple for teacher

What is ITIL? Your guide to the IT Infrastructure Library

ITIL is a framework of best practices for delivering IT services. ITIL’s systematic approach to IT service management can help businesses manage risk, strengthen customer relations, establish cost-effective practices, and build a...

thumb
video

How to set up security in Office 365 to CIS recommendations

Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.

thumn
video

R tip: Creating color-coded calendars

See how well you’re achieving daily goals with a color-coded calendar made in R

thumbnail
video

How to enable and configure Office 365 logging and auditing

Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.

thumb
video

How to find Windows security setup resources

Find security scripts, compliance and other Windows resources.

thumbnail
video

Preventing data leakage in Windows

Set data loss prevention policies in Windows 10 to prevent data leakage.

thumbnail
video

Preventing malicious links in Windows

Set Office 365 Advanced Threat Protection policies to block known malicious URL addresses.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

How to set up multi-factor authentication in Microsoft Office 365

Follow these steps to enable multi-factor authentication in Office 365 for more secure log-ins.

Load More
You Might Also Like