consigliere of your IT administrationABOVE IT

Cybersecurity

A cloud-managed network requires a new kind of access management!

A cloud-managed network requires a new kind of access management. Cloud services bring savings in terms of IT infrastructure, but also new security challenges. Cisco Access Manager is a modern, cloud-based access management solution integrated into the Meraki ecosystem, which facilitates secure network access without complex configurations. In this blog, I will introduce Cisco Meraki networks’ new access management solution, Cisco Access Manager.

SME Cybersecurity in Practice: Less Hype, More Concrete Action

A Hacker Implementing Everyday Cybersecurity

As an experienced cybersecurity consultant, I would venture to make the following claim: SME cybersecurity doesn’t collapse due to threats from hacker movies, but rather from everyday fundamentals. Machines that don’t get updates. Users who work with admin credentials ‘because it doesn’t work otherwise.’ Firewalls whose default settings no one has bothered to review. And […]

Modern Update Management

With the end of Windows 10 support and the continuously evolving threat landscape, managing updates for operating systems and software has become one of the critical aspects of cybersecurity. Organizations need solutions that are secure, scalable, and easy to manage—especially in today’s hybrid and remote work environments. In this blog, I will introduce you to […]

Microsoft 365 Tutorial Video – Part 6. – Patch My PC Home Updater

During autumn 2025, Above IT will continue publishing Microsoft 365 tutorial videos. In the sixth part of the video series, Above IT ‘consigliere’ Lauri Haveri reviews endpoint patching – this time on home computers. Because it is true that even at home, computer vulnerabilities should be patched. We will continue to publish similar tutorial videos […]

Acronyms in Information Security

When working in the IT field, one often encounters various acronyms. Information security is no exception; it also uses terminology that one should be familiar with. Understanding these terms becomes particularly important when acquiring such services for organizational use. Some of the more common acronyms you might encounter in the field of information security today […]

Microsegmentation – small networks, but great security

Local network segmentation is a cybersecurity topic that is discussed too little. Microsegmentation may be perceived as technically too difficult to implement. On the other hand, as services move to the cloud, it may be felt that the organization no longer needs anything other than an internet connection, so why is it still important to […]

Microsoft 365 Tutorial Video – Part 5 – Microsoft 365 Breaches

During the fall of 2025, Above IT will continue to release Microsoft 365 tutorial videos. In the fifth part of the tutorial series, Above IT ‘consigliere’ Lauri Haveri reviews the security and breaches of the Microsoft 365 environment, which the Cybersecurity Center has recently warned about. We will continue to publish similar tutorial videos monthly […]

Microsoft 365 Tutorial Video – Part 4 – Securing Microsoft 365 Environments

During the fall of 2025, Above IT continues to release Microsoft 365 tutorial videos. In the fourth part of the tutorial video series, Above IT ‘consigliere’ Lauri Haveri goes through ensuring the continuity of the Microsoft 365 environment. We will continue to publish similar tutorial videos monthly in the future – for the benefit of […]

Attack Paths and Attack Surface

Cybersecurity is more important today than ever before, and one of the key concepts in this context are attack paths and attack surface. But what do these terms actually mean and why is understanding them essential for every organization? Matias Haapaniemi explains these basics in his blog post this time. Attack Paths and Attack Surface […]

Hae sivuilta:

Search site: