There’s unfortunately no getting around the fact that alongside advances in computing are advances in malware. Engineers do an admirable job of keeping up with the newest and most dangerous of those malwares, but there’s always new wrinkles on existing ones that make it much more of a challenge. All of this may not be very concerning to the average individual who goes online for recreational or avocational purposes, but if you’ve got sensitive information related to your business and no choice but to have it stored and transmitted in digital form then this is a genuine issue. Now here at 4GoodHosting we’re like any Canadian web hosting provider in that we are definitely in that 2nd category, and we always have to be on our toes when it comes to responding new digital security risks as part of offering the peace of mind we need to offer to our customers. Any host that’s running a legit web hosting business is going to have extensive protocols in place related to this, but there’s a need for introspection and being proactive with identifying potential deficiencies and making upgrades. Now we know as well that some of you are firmly in the Mac camp, while others are equally as dedicated to PC. We’ll leave Apple out of it for today, as what’s noteworthy this week is that Microsoft’s newest Windows 10 OS is featuring a new and revamped Windows Defender that not only improves on malware defence, but also expands that benefit for anyone who’s been using Microsoft Defender for Endpoint. From ‘Semi’ to ‘Full’ Windows 10 users are well accustomed to Windows Defender being automated for protecting their PC from malware. However, for enterprise users who rely on Microsoft Defender for Endpoint there’s a lot more coming in the way of what can be done for dealing with malware. And all thanks to a simple setting change. Microsoft Defender has always shipped with a default automation level that was set to ‘semi.’ With that the software automatically inspects files, processes, services, registry keys, and any area that may contain threat-related evidence and then prompts a response action to contain that malicious...
On This Page