Calcom Blog

New Posts Policy Expert All Posts

NIST guidelines for server hardening

Follow NIST server hardening Guidelines

The NIST SP 800-123 Guide to General Server Security contains NIST recommendations on how to secure your servers. It offers general advice and guideline on how you should approach this mission.

Read Post

How to Protect Your Microsoft Server

Mitigating risk Microsoft server

Windows Server ships with a default configuration that is designed to strike a balance between security and compatibility, allowing most applications to work without any changes to server security settings. But

Read Post

server hardening- where to begin

Big journeys begin with small steps

Why server hardening is critical for the enterprise? Server hardening is essential for security and compliance.  To ensure the reliable and secure delivery of data, all servers must be secured through hardening.

Read Post

CMMC for beginners- learn what it’s all about

cmmc dod

The Department of Defense (DoD) is facing severe difficulties when it comes to securing data. The outcomes of covered defense information (CDI) being stolen or manipulated can be devastating. The DoD

Read Post

Emotet, TrickBot & Ryuk Attack Can Be Mitigated With Hardening

Three Wise Monkeys : Chimpanzee

A new trend of a combo triple threat attacks is becoming more and more prevalent in recent days. The triple attack combines Emotet, TrickBot – relatively old attacks that are leveraged

Read Post

Ryuk’s attack on nursing homes threatens people’s health

Cropped shot of a senior man looking thoughtful while sitting by himself in a living room

Ryuk strikes again, this time outbreaking Virtual Care Provider Inc. (VCPI) IT company responsible for providing cloud data hosting, security and access management to more than 100 nursing homes across the

Read Post

Ryuk strikes again effecting 400 veterinary hospitals

Analyzing the result. Male veterinarian in work uniform is looking at the x-ray with small dog while working in the veterinary clinic. Pet care concept. Medicine concept. Animal hospital

The National Veterinary Association (NVA) in California reviles that more than half of its animal care facilities got effected by the Ryuk ransomware attack last month. The facilities are still recovering

Read Post

Misconfiguration and Inadequate Change Control is a Top Threat to Cloud Computing

top threats cloud computing

The Cloud Security Alliance (CSA) published its annual report for top threats, risks, and vulnerabilities in the cloud for 2019.   The CSA is a world-leading organization dedicated to establishing best

Read Post

October’s NTLM MIC vulnerability

Retro golden microphone for press conference or interview on table front gradient mint green background. Vintage old style filtered photo

Another vulnerability was recently found in IIS server NTLM protocol, exposing the targeted server to a relay attack. This vulnerability joins several other vulnerabilities discovered by the Preempt research team. Given

Read Post

How to Automate IIS Hardening with PowerShell

Compass, Arrow, Quality, Business, Compliance, white background

IIS is a popular choice of a web server. Hosted on Windows Server, IIS allows organizations to host serve up websites and services of all kinds. But due to its popularity

Read Post

RDS: Do Not Allow COM Port Redirection- The Policy Expert

CALCOM_COP04

  COM port is the name of the serial port interface on IBM PC-compatible computers. It can refer not only to physical ports but also to emulated ports, such as ports created by Bluetooth or USB-to-serial adapters.   POLICY DESCRIPTION: This

Read Post

Restrict NTLM: Audit Incoming NTLM Traffic- The Policy Expert

CALCOM_COP01

NTLM is Microsoft’s old mythological authentication protocol. Although new and better authentication protocol has already been developed, NTLM is still very much in use. Basically, even the most recent Windows versions

Read Post

LAN Manager authentication level- The Policy Expert

CALCOM_COP02

NTLM attacks are especially relevant to Active Directory environments. One of the most common attack scenarios is NTLM Relay, where the attacker compromises one machine and then spreads laterally to other

Read Post

RDS: Require user authentication for remote connections by using Network Level Authentication (NLA)- The policy expert

CALCOM_COP03

POLICY DESCRIPTION: This policy setting allows you to specify whether to require user authentication for remote connections to the RD Session Host server by using Network Level Authentication (NLA). This policy

Read Post

RDS: Do not allow supported Plug and Play device redirection- The policy expert

CALCOM_COP04

POLICY DESCRIPTION: This policy setting allows you to control the redirection of supported Plug and Play devices, such as Windows Portable Devices, to the remote computer in a Remote Desktop Services

Read Post

MSS: (DisableIPSourceRouting) IP source routing protection level (protect against packet spoofing)- The Policy Expert

CALCOM_COP02

Configuring this value in the most secure fashion can help to lower the risk for DOS attacks via packet spoofing. The objective of this kind of attack is to flood the

Read Post

RDS: Do not allow clipboard redirection- The Policy Expert

CALCOM_COP01

  POLICY DESCRIPTION: Specifies whether to prevent the sharing of clipboard contents (clipboard redirection) between a remote computer and a client computer during a Remote Desktop Services session. You can use this

Read Post

Configuring Maximum Security Log Size- The Policy Expert

CALCOM_COP03

Maximum log size should be set to any kind of event logs, as part of your security policy. This configuration’s value is highly important for detecting attacks and investigating their source.

Read Post

NIST guidelines for server hardening

Follow NIST server hardening Guidelines

The NIST SP 800-123 Guide to General Server Security contains NIST recommendations on how to secure your servers. It offers general advice and guideline on how you should approach this mission.

Read Post

RDS: Do Not Allow COM Port Redirection- The Policy Expert

CALCOM_COP04

  COM port is the name of the serial port interface on IBM PC-compatible computers. It can refer not only to physical ports but also to emulated ports, such as ports created by Bluetooth or USB-to-serial adapters.   POLICY DESCRIPTION: This

Read Post

How to Protect Your Microsoft Server

Mitigating risk Microsoft server

Windows Server ships with a default configuration that is designed to strike a balance between security and compatibility, allowing most applications to work without any changes to server security settings. But

Read Post

server hardening- where to begin

Big journeys begin with small steps

Why server hardening is critical for the enterprise? Server hardening is essential for security and compliance.  To ensure the reliable and secure delivery of data, all servers must be secured through hardening.

Read Post

CMMC for beginners- learn what it’s all about

cmmc dod

The Department of Defense (DoD) is facing severe difficulties when it comes to securing data. The outcomes of covered defense information (CDI) being stolen or manipulated can be devastating. The DoD

Read Post

Restrict NTLM: Audit Incoming NTLM Traffic- The Policy Expert

CALCOM_COP01

NTLM is Microsoft’s old mythological authentication protocol. Although new and better authentication protocol has already been developed, NTLM is still very much in use. Basically, even the most recent Windows versions

Read Post

Emotet, TrickBot & Ryuk Attack Can Be Mitigated With Hardening

Three Wise Monkeys : Chimpanzee

A new trend of a combo triple threat attacks is becoming more and more prevalent in recent days. The triple attack combines Emotet, TrickBot – relatively old attacks that are leveraged

Read Post

Ryuk’s attack on nursing homes threatens people’s health

Cropped shot of a senior man looking thoughtful while sitting by himself in a living room

Ryuk strikes again, this time outbreaking Virtual Care Provider Inc. (VCPI) IT company responsible for providing cloud data hosting, security and access management to more than 100 nursing homes across the

Read Post

Ryuk strikes again effecting 400 veterinary hospitals

Analyzing the result. Male veterinarian in work uniform is looking at the x-ray with small dog while working in the veterinary clinic. Pet care concept. Medicine concept. Animal hospital

The National Veterinary Association (NVA) in California reviles that more than half of its animal care facilities got effected by the Ryuk ransomware attack last month. The facilities are still recovering

Read Post

Misconfiguration and Inadequate Change Control is a Top Threat to Cloud Computing

top threats cloud computing

The Cloud Security Alliance (CSA) published its annual report for top threats, risks, and vulnerabilities in the cloud for 2019.   The CSA is a world-leading organization dedicated to establishing best

Read Post