As part of our coronavirus response, we've released a new free tool, unTun365, to create a split tunnel VPN that excludes Office 365 traffic.
Read More
Is your staff ready to work from home en masse? Consult the FireOak Strategies Coronavirus Cybersecurity Checklist to prepare your organization.
Read More
What’s the state of email security for the 2020 presidential candidates? And what about the security of candidates’ websites? Read more for our analysis!
Read More
4 ways in which the deleted Epstein surveillance video highlights gaps in an organization’s cybersecurity program, and what you can do to prevent such nightmares at your organization.
Read More
In January 2019, a massive database of email addresses and passwords was released on the internet. The collection included over 773 million unique email addresses and 21 million unique passwords, cred...
Read More
We are heavy users of Amazon Web Services (AWS) Elastic Cloud Computing (EC2) and regularly help clients transition their on-premises systems to the cloud.
Read More
In this post, I’ll demonstrate a technique using standard Linux tools to export an AWS volume to another cloud provider or on-prem storage.
Read More
In this post, I’ll demonstrate a technique using standard Linux tools to create a bootable AWS EC2 instance from an imported AWS volume image.
Read More
In Part One, I reviewed the steps required to create and export an image of an AWS EC2 volume. This process works well, but it is somewhat cumbersome and time-consuming for sysadmins, especially whe...
Read More
We're thrilled that Eric's technical review of the new LastPass Multifactor Authenticator got a shout-out as pick-of-the-day on the Daily Tech News Show (DTNS)!
Read More