Managing a Windows 10 migration can be a complicated affair. To help those just getting started, we asked our IT project management teams to provide a list of tips they would recommend to those embarking on a Windows 10 upgrade. While we didn’t include all of their recommendations, we did narrow their responses down to a top ten list of the most commonly recurring advice. Below are the experts’ first five tips with the remaining being posted in part two of this blog (check those out here). For detailed planning guidelines, check out our eBook, Planning for Windows 10 Starts Now.
Managing a Windows 10 migration can be a complicated affair. To help those just getting started, we asked our IT project management teams to provide a list of tips they would recommend to those embarking on a Windows 10 upgrade. While we didn’t include all of their recommendations, we did narrow their responses down to a top ten list of the most commonly recurring advice. Below are the five of the experts’ top tips with the remaining being posted in part one of this blog (check those out here).
Develop a transition strategy for a successful Windows 10 upgrade, and make this migration your best.
As outlined in our previous article, Windows 10 Security, The Good, The Bad, and The Ugly, there are several exciting new security features in Windows 10 Enterprise, such as Device Guard and Credentials Guard, that leverage features of more recent hardware. In order to take full advantage of all that Windows 10 Enterprise has to offer, you will probably need to convert a lot of existing boot drives from BIOS to UEFI, and when you do that, you will also want to enable the Secure Boot feature of your workstation hardware. Sound opaque and confusing? This article will explain what it means and talk about some strategies for making the conversion in your enterprise.
As we noted in our Windows 10 Security overview, one of the exciting new features of Windows 10 Enterprise is Device Guard, an operating system feature for ensuring that only trusted code runs on your systems. At its best, Device Guard uses a signature based model for trusting executables and libraries. However, in an ecosystem with as much legacy as exists in Windows, Device Guard also gives the enterprise the means to handle legacy applications as well.
The following article was written by Eden's own Andy Sherman. It originally appeared on his blog, "My Security Musings." I received an interesting phishing email today. It was from a business acquaintance and contained a link gussied up to look like an online document. The content and format of the email screamed "suspect me" so I did. A URL lengthener confirmed that the tinyurl.com link went someplace having no connection to me or the acquaintance.
If you’ve run one of these projects before, then you already know this is true. If you haven’t, let's quickly break down the problem:
Creating a Windows 10 migration budget doesn’t have to be all that difficult. While the final cost will be based on a number of variables and some in-depth analysis, the budget range can really be determined by answering these four questions:
What is Ransomware? It seems that hardly a day goes by that we don’t read about a new strain of ransomware or a new victim of a ransomware attack. Ransomware is malware that encrypts the user’s or organization’s files and demands payment for the decryption key. The ransomware business model is often one that provides friendly customer service and really does deliver the key in exchange for the requested amount of Bitcoin. However, there is no guarantee that they will, and they don’t always, so it’s not a long term strategy for protecting your enterprise to depend upon the good will of criminals.
There’s a lot of buzz around Windows 10 security. For example, Infoworld dubs Windows 10 as “the most secure Windows ever.” Although that sounds like the hype cycle at work, in fact, some of the new security features in Windows 10 are game changers that will help change the balance of power between enterprise customers and the perpetrators of Advanced Persistent Threats (APT). There’s also at least one monstrously bad idea baked into Windows 10, and the usual collection of features where we think the default behavior is too open and should be modified.
Microsoft’s introduction of Windows 10 in July 2015 set the clock ticking for IT organizations around the world to start mapping out their enterprise migration plans. Whether it’s from Windows 7, 8, 8.1, or an earlier version of the operating system, the process will require a significant investment of time and resources. With thousands of interdependent variables to manage, the process is complex and often difficult to manage. To ensure the process runs smoothly and efficiently requires close management and sophisticated tools.