NH Learning Solutions Blog
How to Filter Out Automatic Replies in Microsoft Outlook
Emails are the most basic form of communication in a work environment. The average number of emails an employee can receive each day is about 121 from a various number of people. From those, a large number of those are automatic replies. There is nothing worse than expecting a speedy response, only to be fooled when that new message is an auto reply. Here's a way to filter those responses out of your inbox.
6 Cybersecurity Precautions Companies Fail to Take
Guest Author: Shawn Stugart, Technical Instructor
The September 2017 Equifax breach is shaping up not only to be one of the largest in history (143 million private records exposed, or about 44 percent of US adults) but also the most potentially damaging since the data includes names, birth dates, Social Security numbers, and, in some cases, driver’s license and credit card numbers. In combination, this personally identifiable information could be used by identity thieves to open new lines of credit, apply for loans, file fraudulent tax returns, and more.
New GRUB 2 Features when Upgrading to RHEL 7
Guest Author: Ralph Nyberg, Technical Instructor
System administrators who are planning to upgrade to Red Hat Enterprise Linux 7 (RHEL) have a a change coming to them. With the newer versions of Red Hat, a new version of GRUB, the Red Hat boot loader, will be the new default. GRUB 2, the new boot loader, will bring a few changes in configuration and management.
The NIST Cybersecurity Framework & Workforce Development
In May of 2017, President Trump issued an Executive Order for “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure,” which hold heads of executive departments and agencies (agency heads) accountable for managing cybersecurity risk to their enterprises.
How to Help Secure Windows Server
As more IT infrastructures become virtualized and migrate to public, private and hybrid cloud environments, cybersecurity has been a persistent concern. Taking assets off premises and entrusting them to third-party service providers always carries at least some degree of risk; the hardware and software that were once under your direct supervision are now someone else's responsibility. Although they are usually in good and experienced hands, you have to remain vigilant against the various possible cyberattacks against your critical servers, storage, networks and applications.