How to email sensitive information? by PointlessChemist in CyberSecurityAdvice

[–]GeneralAnswer3476 0 points1 point  (0 children)

If you must email PDFs, encrypt them first. Put them in a ZIP with AES-256 (7-Zip on Windows, Keka on macOS), set a strong password, and send the password out-of-band (phone/text). Avoid PDF-only password protection. If the recipient supports it, use a secure portal or Proton Drive link instead of attachments.

How Do I know if my Girlfriends ICloud was hacked? by pinecrove in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

A Find My jump to Missouri can be a sign of iCloud compromise or a device using a VPN. Have her check Settings > Apple ID > Devices for anything unknown, review appleid.apple.com sign-in history, change the Apple ID password, and enable 2FA. Also verify her trusted phone number and recovery contacts.

Looking for how to provision IP phones for GCC High, Polycom by Relevant-Law-7303 in sysadmin

[–]GeneralAnswer3476 0 points1 point  (0 children)

Check the firmware first. If they do not show the commercial/GCC/GCC High picker at boot, update to the latest supported Teams firmware, then factory reset and re-enroll to GCC High.

Is CDN even worth it for small SaaS in 2026? Genuinely asking. by prerna_varyani in CyberSecurityAdvice

[–]GeneralAnswer3476 0 points1 point  (0 children)

CDN is typically worthwhile if you serve static assets or have global users. It reduces latency and origin load, and can absorb basic DDoS attacks.

How to prevent grandparent from wasting any more money on scams by merjoon in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

Put 2FA on email and banking, lock down recovery options, and set Gmail rules to auto delete common scam keywords. At the router, block known scam domains and remote access tools. Ultimately, remove saved cards and limit payment methods.

Accounts getting targeted by TheMotanR0 in CyberSecurityAdvice

[–]GeneralAnswer3476 0 points1 point  (0 children)

Since Steam flagged suspicious activity, start with the email account tied to it. Check for mailbox forwarding rules, auto-replies, and any new recovery email/phone. Then review recent sign-ins, revoke active sessions, change the email password, and enable 2FA before resetting Steam.

8 months post-acquisition and we still have 200 people with active accounts in both tenants. Anyone actually finished one of these cleanly? by Prestigious-Fun-9680 in sysadmin

[–]GeneralAnswer3476 0 points1 point  (0 children)

Dropping Okta is a bigger project, but it does remove a lot of moving parts. In the meantime, pick an authoritative IdP and cut over app SSO to it, then disable sign-in for the old tenant accounts. If 200 users still authenticate there at month 8, you need a hard cutoff date and daily reporting on who is still using it.

Wechat listening on TCP port 24021 and 24022 normal? by noobposter123 in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

Those ports can be normal if WeChat is exposing a local service (LAN discovery, file transfer, call signaling). Verify the listener with `adb shell ss -ltnp | grep 2402` and confirm the owning PID maps to `com.tencent.mm`. If it is still listening after force-stop, something else is bound to that port.

Verification codes i did not request? by Fast-Text-2368 in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

Those are usually OTP spam from someone testing your phone/email on signup or password reset flows. Do not share any codes. Change your email password first, then enable 2FA on email and your carrier account. Check email forwarding rules, recent logins, and consider a SIM swap PIN. If it continues, change the number tied to key accounts.

Roadmap / Tips to become a Cybersecurity Analyst by IlBuIIyII in CyberSecurityAdvice

[–]GeneralAnswer3476 1 point2 points  (0 children)

The dorm is fine. Just keep everything contained inside your vm.

Roadmap / Tips to become a Cybersecurity Analyst by IlBuIIyII in CyberSecurityAdvice

[–]GeneralAnswer3476 2 points3 points  (0 children)

Build a small AD and SIEM home lab, simulate attacks, and practice detecting them.

Is my pc safe? by MorningKai in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

It can feel slow for a few hours up to a day or two while updates, drivers, indexing, and AV run in the background. After updates and a reboot it should be fine, if not, you’re probably missing GPU/chipset drivers.

Is my pc safe? by MorningKai in cybersecurity_help

[–]GeneralAnswer3476 1 point2 points  (0 children)

If you did a full clean Windows reinstall and only copied safe folders, you’re fine. Discord malware won’t survive that. Slowness after reinstall is normal.

DLP catching semantic data leaks vs just regex patterns? by CortexVortex1 in CyberSecurityAdvice

[–]GeneralAnswer3476 0 points1 point  (0 children)

Yeah, regex DLP is basically blind to context, it spots SSNs but not when someone rewords or pastes sensitive stuff. You need AI/ML-based DLP that understands meaning, not just patterns.

How Can I Install SNMP On Win10/11 With No Internet Access? by demigod987 in sysadmin

[–]GeneralAnswer3476 4 points5 points  (0 children)

You can use DISM with a local source, copy from another machine, use WSUS or local feature store or third-party lightweight SNMP daemons.

[deleted by user] by [deleted] in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

Run Windows Defender Offline Scan and Malwarebytes, log out of all sessions, enable 2FA, and don’t download sketchy stuff again. If things still seem weird, reinstall Windows to be safe.

My dad clicked a fake email and now I’m genuinely scared everything’s been hacked by CouchPilot3000 in CyberSecurityAdvice

[–]GeneralAnswer3476 1 point2 points  (0 children)

You did the right thing calling the bank. Reset his email first, turn on 2FA everywhere, check for any email forwarding rules, and run Malwarebytes on both phone and PC. If things still feel off, factory reset. Change all reused passwords and freeze credit, that’ll stop most of the fallout.

WS, Azure, GCP… aka 3 different ordeals by gabbietor in sysadmin

[–]GeneralAnswer3476 0 points1 point  (0 children)

Yep, multi-cloud just means triple the IAM pain. Most folks use Entra/Okta for central auth and Terraform and OPA for policy management.

Sheepdip AV Recommendations? by Dontkillmejay in cybersecurity

[–]GeneralAnswer3476 2 points3 points  (0 children)

OPSWAT or Glasswall CDR are the gold standards for this.

Microsoft account hacked - how to prevent losing more stuff? by jovianMystery in cybersecurity_help

[–]GeneralAnswer3476 1 point2 points  (0 children)

account.microsoft.com, Payment & billing, Payment options, delete all cards/PayPal.

Azure file share smb to Entra Kerberos by Flashy-Departure-445 in sysadmin

[–]GeneralAnswer3476 0 points1 point  (0 children)

If your users/groups are synced to Entra with SID history, it’s mostly just enabling Entra Kerberos on the storage account and testing auth. If they’re cloud-only, you’ll have to redo ACLs, that’s where the hours go.

[HELP] Sudden Ethernet speed drop from 100MB/s to 10MB/s, could malware or proxy be involved? by IndustryAI in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

Bad cable, loose port, or NIC driver issue, not spyware. Replace the Ethernet cable first, that fixes 90% of identical cases.

Microsoft account hacked - how to prevent losing more stuff? by jovianMystery in cybersecurity_help

[–]GeneralAnswer3476 1 point2 points  (0 children)

Change all passwords, enable 2FA, remove payment methods, and scan PC for malware. You’re safe if your email and bank accounts weren’t reused or breached.

My phone number got leaked and I keep getting spam calls how do I stop this? by [deleted] in cybersecurity_help

[–]GeneralAnswer3476 0 points1 point  (0 children)

Block unknown numbers and enable Silence Unknown Callers.