Woosh?
IHawkMike
What a dummy!
I heavily use both and this is objectively untrue.
This is a good answer.
To add, for Linux kernels, the maintainer use a shim EFI package with the distro's keys (e.g., Canonical's keys for Ubuntu) which loads the maintainer-signed kernel. And Microsoft signs the shim to keep the chain intact.
I don't deal with hardware much anymore, but I'd take Aruba over Cisco any day. But for everything else, yeah fuck HP.
I'm Ron Burgundy?
Nothing you said is wrong, in fact it's all good advice. But none of what you listed implicitly provides protection against ransomware either.
For that you need backups that are immutable. That is, even you as the admin cannot alter, encrypt, or delete them because your threat model should assume full admin account compromise. There are several onprem solutions for it and most of the cloud providers offer immutable storage now too.
And at the very least, remove AD SSO from your backup software admin portals (and hypervisors); make your admins use a password safe.
What you should be worried about more than a keylogger is that most 2.4 GHz wireless keyboards can have the keystrokes sniffed through the air. Bluetooth will be encrypted though.
That's not on the spreadsheet so it doesn't count.
"To read the purported PDF document, victims are persuaded to click a URL containing a list of steps to register their Windows system. The registration link urges them to launch PowerShell as an administrator and copy/paste the displayed code snippet into the terminal, and execute it."
This is not new, nor is it newsworthy.
Ah good point. Cheers.
The Kuva Bramma in Warframe. Just rains cluster bombs.