After Atlanta SamSam Ransomware Attack, Learn How to Better Protect your Agency
Another day, another government ransomware victim. On March 22nd, 2018, the city of Atlanta found itself locked out of computers across government offices and facing a ransom demand of $51,000 or $6,800 per computer, GCN reported.
Top 10 Tips for Revit Beginners: A Prescription for Information Modeling Success
If you’re fairly new to Autodesk Revit and looking for ways to quickly get up to speed, Autodesk put together a great webinar that offers tips and tricks to get the most out of your user experience. Topics included:
• How does it differ from AutoCAD?
• What do I need to know to get started?
• What are some best practices for working in Revit?
• What are families and how do I use them?
• Where to learn more and how to get support when problems happen
Breakthrough in Ransomware Prevention is Good News for Government Agencies
Ransomware is quickly becoming the favored means for criminals to extract a profit from unsuspecting villains – most notably in the public sector. Throughout 2017 ransomware grabbed the headlines – WannaCry, Petya, etc. – both of which targeted government agencies. When they succeed the implications can be serious.
Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack
Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and admin delegations and privileges. If any one of these targets is compromised, your entire Active Directory can be compromised too.
The Threats
Active Directory’s Attack Surface is Huge – Here’s How to Find a Threat Needle in its Log Haystack
Microsoft Active Directory is a critical tool that helps system administrators manage user privileges and secure their IT infrastructure, yet Active Directory presents several security challenges. Most problematic is that Active Directory’s attack surface is huge. Targets for attack include every domain name user account, admin and security group, domain controller, backup, admin workstation, and admin delegations and privileges. If any one of these targets is compromised, your entire Active Directory can be compromised too.
The Threats
SaaS Offering Simplifies Remote Application Access Control, Reduces Attack Surface
Ransomware tops today’s list of security concerns for governments, and no agency is immune. Just look at the statistics:
• Cook County, Chicago was a victim of last year’s WannaCry ransomware attack.
• St. Louis Public Library was hit with ransomware, demanding $35,000 in Bitcoin.
• Bingham County, Idaho paid out #3,000 in ransomware to restore its servers.
A Civil Engineering Love Match: How InfraWorks and Civil 3D Come Together
If you currently use Autodesk’s flagship civil engineering design software, AutoCAD Civil 3D, you may have heard about its close cousin, InfraWorks. InfraWorks is an infrastructure design software that supports BIM processes and helps designers and engineers work in infrastructure projects in a real-world context using cloud capabilities.
10 Things Your Facilities Management Team Can Do to Rock in the Field
The use of building information modeling (BIM) data by building owners and facilities managers is on the rise, a survey by DLT partner, IMAGINiT Technologies reveals. Compared to 2016, the percentage of owners integrating BIM data into facilities management (FM) systems has increased by almost 9%. Yet challenges remain. Many organizations aren’t prepared or equipped to make the process and technology changes required for BIM adoption.
Managing the Invisible Network (IoT)
Ah, the good old days, when things were simple. When there were a known number of devices on any government network, and the federal IT pro had a complete understanding of how to secure those devices.