Technical Help

John Roberts avatar Dr. Lee Mangold avatar Jen McPhillips avatar
27 articles in this collection
Written by John Roberts, Dr. Lee Mangold, and Jen McPhillips

What's a password manager?

Everything you need to know about good password hygiene and using a password manager.
Jen McPhillips avatar
Written by Jen McPhillips
Updated over a week ago

How do I know if my computers are encrypted?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How Coalition helps with NYDFS compliance

New York State Department of Financial Services regulation 23 NYCRR 500)
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is the Impact of Unpatched Software?

Understanding the value of updating software applications
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is Denial of Service (DoS/DDoS)

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is Ransomware?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is the impact of a look-alike domain?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What does “Exposed Employee Information” mean on a Risk Assessment?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is Remote Desktop Protocol (RDP)?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Configuring and Deploying Cloudflare

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is DNSSEC?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling SPF to Secure your Email

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is SSL/TLS?

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Protecting your email with SPF, DKIM, and DMARC

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Tagging External Emails in Office 365

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling Security Audit Logging in Office 365

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

What is a CVE?

Learn what CVEs are and why they're important to track.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling 2FA in WordPress

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Accepting Healthcare Appointments Online

How should a medical service provider handle accepting patient appointments?
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Choosing the right hosting provider for your business

How to choose a web hosting service that's right for you and your business.
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

How to mitigate CVE-2018-9206 - jQuery File Uploader vulnerability

Vulnerability in the popular jQuery plugin disclosed October 2018
John Roberts avatar
Written by John Roberts
Updated over a week ago

Password Extortion Scam

New email spear phishing scam uses your own password
Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Two-Factor Authentication

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Enabling Two-Factor Authentication on Office 365

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Vulnerability: Windows file sharing ports

Dr. Lee Mangold avatar
Written by Dr. Lee Mangold
Updated over a week ago

Password requirements for Coalition accounts

Coalition requires strong passwords to protect your clients' data
John Roberts avatar
Written by John Roberts
Updated over a week ago

How to enable JavaScript

You must enable JavaScript in order to use the Coalition platform
John Roberts avatar
Written by John Roberts
Updated over a week ago