Profile

CommunityPlatform_1350x900.jpg

Ken Johnson

Edit My Profile


My Content

1 to 5 of 5 total
Posted By Ken Johnson 01-31-2024 10:15:50 AM
Found In Egroup: Cybersecurity
\ view thread
As part of ongoing risk analysis and yearly audit/insurance processes, we review our DNS practices yearly. We currently use a major-vendor Firewall DNS Proxy (I can provide the specific provider if that affects your recommendation), and Google DNS as an upstream DNS provider path. We have ...
Posted By Ken Johnson 10-04-2023 07:52:53 AM
Found In Egroup: CIO
\ view thread
We are constructing a new small hardened datacenter and I wanted to inquire about colleague's experience with fire suppression. The datacenter is about 46' x 15' not including an additional 12x12 vestibule and will be all concrete construction including the roof and rated for major category 4 wind ...
Posted By Ken Johnson 09-23-2022 08:19:48 AM
Found In Egroup: CIO
\ view thread
I'm curious to get the input of other institutions who may have addressed this issue. We are admitting some international students that go by only one name in their country of origin. Their legal, governmental documents (such as passport, etc) from those countries only have one name listed for these ...
Posted By Ken Johnson 09-21-2022 10:54:20 AM
Found In Egroup: CIO
\ view thread
I'm curious to get the input of other institutions who may have addressed this issue. We are admitting some international students that go by only one name in their country of origin. Their legal, governmental documents (such as passport, etc) from those countries only have one name listed for these ...
Posted By Ken Johnson 04-20-2022 07:45:00 AM
Found In Egroup: Cybersecurity
\ view thread
We've been trying to work through a best practice I'm curious if someone has additional insight into. We have a number of MS exploit protection settings enforced via Group Policy/MDM/Intune and those work well (in terms of doing what they are supposed to do). However - one, "Do not allow child processes," ...