brandon lee writer

Brandon Lee

Networking
Storage
Virtualization

Brandon Lee has been in the industry 20+ years, is a prolific blogger focusing on networking, virtualization, storage, security & cloud, and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com.

Articles written by Brandon Lee

  • Kalix municipality

    Ransomware attacks continue to rage on government entities

    Ransomware attacks are on the rise and target businesses across many industries and sectors. Government entities are also on the radar of ransomware gangs and have been the subject of many high-profile ransomware attacks. Governmental entities have been a high-level…

    Read More
  • man with hood praying with ransomware word on top of him

    How to recover from a ransomware attack

    It is arguably one of the most dreaded words for any organization today – ransomware. Ransomware can bring a bustling, thriving, profitable business to its knees in hours. The aftermath can lead to a ripple effect of lost revenue, and…

    Read More
  • data encrypted message on screen

    Active Directory and domain controller security best practices

    Windows Servers in the environment housing the Active Directory Domain Services (AD DS) role are some of the most sought-after targets for attackers today. It is because Active Directory contains the credential store for all the user and computer accounts…

    Read More
  • screen with lock on it

    SolarWinds hack explained: Weak password “solarwinds123” cause of SolarWinds Hack

    When you look at many of the high-profile breaches that have taken place in recent years, many of them had a common denominator - weak or compromised passwords. Weak passwords are easily compromised and can lead to significant breach events…

    Read More
  • woman on desktop and talking on phone

    7 top trends in cybersecurity for 2022

    Cybersecurity has become a critical priority for businesses as they now navigate current threats in 2022. Many trends in cybersecurity are emerging as companies continue to make adjustments due to the threat landscape. The stakes could not be higher as…

    Read More
  • school buses

    Family Educational Rights and Privacy Act (FERPA)

    Most have heard of HIPAA, GPDR, and other compliance regulations and best practices that govern data privacy and security for healthcare, personally identifiable information, and other forms of sensitive data. However, when it comes to educational institutions, the Family Educational…

    Read More
  • screen with lock on it

    Vulnerability testing vs. Penetration testing

    With the wide range of growing cybersecurity threats creating risks for businesses today, organizations must be proactive in their approach to cybersecurity. The days of reactive security and waiting for cybersecurity incidents are over. The sheer scope, scale, and damage…

    Read More
  • desktop screen with warnings

    Remote desktop protocol TCP port 3389 security risks and vulnerabilities

    There is no question that we’ve seen businesses scrambling to meet the needs of the distributed workforce. Many different remote access technologies allow businesses to provide the connectivity needed for remote employees to access business-critical applications. Remote Desktop Protocol (RDP)…

    Read More
  • mobile phone and laptop with cybersecurity on it

    Passwordless realities of Entra ID (formerly Azure AD) Temporary Access Pass 

    One of the new movements in authentication technology is called passwordless authentication. With passwordless authentication, end-users can use other means to sign in aside from the traditional password. Microsoft’s Temporary Access Pass for Microsoft Entra ID (formerly Azure Active Directory)…

    Read More
  • blue outline of hand with finger pointing

    Is your SSO login protected enough?

    Today, many organizations use more systems than ever, spanning on-premises and cloud environments. As a result, employees are tasked with remembering more and more passwords as the number of systems and services continues to grow. Single Sign-On (SSO) is a…

    Read More