Principle Logic Logo
    770-917-9600
  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

Kevin Beaver's Security Blog

  • Some stuff you need to know about Windows 8.x, Internet Explorer, BYOD/MDM, and malware removal

    31 Jan 2014

    My goodness, I’ve let a lot of my articles on Windows 8, 8.1, patching, malware, and related desktop security topics stack up! Check these out:

    Don’t ignore Windows 8 security when reviewing desktop vulnerabilities
    IT can tackle Windows configuration with a well-planned desktop audit
    Windows Server Update Services weaknesses you may not know about <=this is BIG, seriously!
    Why a Windows security scan is not enough to protect your workstations

    Five steps to successful bot removal from enterprise desktops
    Whitelisting can complement Windows 8 malware removal and prevention
    Malware detection questions for IT to answer for desktop security

    New Windows 8.1 features can boost mobile device management
    Don’t ignore mobile security effects on enterprise desktop management
    IT needs to keep up with workers who use desktop cloud backup
    Enterprises can’t afford a half-baked mobile security strategy
    Windows Phone 8 security should be part of any mobile device strategy

    Locking down Internet Explorer settings with Group Policy in IE 11
    Beat bad browser behavior by troubleshooting IE 10
    Microsoft Office 2013 crackable, so look to Office password recovery

    What you need to know about the Windows Security Accounts Manager
    Bring some control to cloud file sharing with Windows 8.1 Work Folders

    Be sure to go to principlelogic.com/resources for links to hundreds of security resources I’ve written/developed over the past decade+.

Resources

  • My books
  • My blogs and columns
  • My YouTube videos
  • My Security On Wheels audio programs
  • My articles, podcasts, and webcasts
  • My downloadable book chapters
  • My currently-published whitepapers and guides
view all

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)
Read More

 

I’ve written/co-written 12 books on information security including:

 

Tags

application security basics books careers CISO CISSP cities compliance coronavirus covid-19 data breaches hacking Hacking For Dummies heads in sand incident response information risk keynote speaker leadership macOS networked cameras patching racing resilience SDLC security culture security leadership security program management security speaker selling security social engineering speaking engagements spec miata sql injection tiktok training vulnerability and penetration testing web security web service api security

© Copyright 2001-present, Principle Logic, LLC - All Rights Reserved.

  • Home
  • About
  • Services
  • Resources
  • Blog
  • Contact

For your convenience I accept