For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Hacker’s Paradise: Top 10 Biggest Threats When Working From Home

Hacker’s Paradise: Top 10 Biggest Threats When Working From Home 00:54
Preview TEC session with Paula Januszkiewicz in which she will discuss the most common threats in remote work environments and solutions to avoid being a part of hacker’s paradise.

Related videos

Reduce user error and fatigue by implementing a Power Virtual Agent in Microsoft Teams
Reduce user error and fatigue by implementing a Power Virtual Agent in Microsoft Teams

Preview TEC session with Mark Rackley in which he will show you how to use Power Virtual Agents in Microsoft Teams without additional licensing costs to you.

The Experts Conference 2023 Keynote: Justin Kohler & Robby Winchester
The Experts Conference 2023 Keynote: Justin Kohler & Robby Winchester

How will identity risk in Active Directory & Azure AD affect you? Justin Kohler & Robby Winchester of SpecterOps share their vision at TEC, Sept 19-20, 2023.

State of AD security with Sean Metcalf
State of AD security with Sean Metcalf

Join Sean Metcalf, Microsoft Certified Master, as he shares tips to bolster AD security.

Quest at RSA 2023
Quest at RSA 2023

Protecting Your AD with Randy Franklin Smith
Protecting Your AD with Randy Franklin Smith

Join Randy Franklin Smith, Microsoft MVP, as he explains the one command that can shut down attacks on your AD.

Guess who's back? TEC!
Guess who's back? TEC!

TEC is back in action, ready to connect IT professionals with pure subject matter experts! Register today:

Ignite 2018: There are no compensating controls for an insecure Active Directory
Ignite 2018: There are no compensating controls for an insecure Active Directory

Today everything needs to be secure, but you need to start with Active Directory. Because if AD isn’t secure – nothing else in your organization is regardless of operating system, products, or procedures. That’s a strong statement, but one that Randy Franklin Smith can back up with facts. In this fast-paced session Randy spotlights the multitudinous ways that virtually any component or information on your network can be compromised if the attacker first gains unauthorized access to AD. The good news is AD was designed well and has stood the test of time. AD security is a matter of design, comprehensive management, and monitoring and is the basis for the list of fundamentals for securing AD shared in this session.

Ignite 2018: How to protect and restore Active Directory from malicious or accidental destruction
Ignite 2018: How to protect and restore Active Directory from malicious or accidental destruction

In this case study session, Neil Flood, Manager of Identity and Access Management for Cargill, joins Brian Hymer from Quest to discuss best practices for Active Directory privileged account auditing and disaster recovery. Discover: - Top indicators of privileged account misuse - Symptoms of a failing (or failed) AD forest - How to determine optimal RTO and RPO - Hybrid AD and Azure AD recovery gotchas - How to justify an auditing and recovery tools purchase to your CISO See a live demo of an AD forest recovery, and get a step-by-step walk through of how to build a virtual test lab using production data.