Jonathan Crowe (@jonathanscrowe) 's Twitter Profile
Jonathan Crowe

@jonathanscrowe

Lifelong noob, Director of Community at @NinjaOne. On Mastodon @[email protected]

ID: 195590434

linkhttps://ninjaone.com/ calendar_today27-09-2010 02:42:11

6,6K Tweet

1,1K Followers

1,1K Following

Kelvin Tegelaar - MVP (@kelvintegelaar) 's Twitter Profile Photo

One cannot use open source projects in good conscience and not contribute to them in some way. I am lucky to be the largest recipient of @Github sponsors in the world. I want to make sure that creators like Przemysław Kłys get what they deserve. I hope others follow!

Thinkst Canary (@thinkstcanary) 's Twitter Profile Photo

It's our birthday, so we created a tiny skunk(worksy) game for you to play.. Complete all 7 continents, and we will send you a limited-edition, 10-year t-shirt. Have fun!! (but watch out for the Canaries) canary.tools/10-year

Martin Himken | MVP (@mhimken) 's Twitter Profile Photo

🖨️💡Have you switched your #Windows printer drivers to v4 or IPP with PSAs yet? Don't know I'm talking about? It's time to read up on this apparently forgotten topic. Out of the five customers I had today, none of them knew about the change. To busy w/ W11 learn.microsoft.com/en-us/windows-…

🖨️💡Have you switched your #Windows printer drivers to v4 or IPP with PSAs yet? Don't know I'm talking about? It's time to read up on this apparently forgotten topic. Out of the five customers I had today, none of them knew about the change. To busy w/ W11
learn.microsoft.com/en-us/windows-…
NinjaOne (@ninjaone) 's Twitter Profile Photo

🚀 From patching pain to game-changing automation. 💡 “NinjaOne cut all the inefficiency out of the picture. It saves us countless hours and has increased our productivity tenfold.” – Ben Perryman, Kansas City With NinjaOne, they boosted efficiency 50%, saved $200K, & ensured

NinjaOne (@ninjaone) 's Twitter Profile Photo

AI Boom or Bust? 🤖 Rethink roles, outcomes, and AI’s impact on MSPs. Join the 3-part series with Empath. Sign up today: see.ninjaone.com/ui6gx

spencer (@techspence) 's Twitter Profile Photo

Doing something is better than nothing. If you’re not sure where to start here’s a few ideas - Keep domain admins off workstations - Strengthen service account passwords - Monitor privileged logins/resources - Lock down AD CS

mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

I was asked a question this week whilst on a panel and I thought I would share this because it might help people! It's not exhaustive but it's the theme: What keeps me up at night when I'm responsible for an orgs security (or I'm advising the person that is)? this is a starting

I was asked a question this week whilst on a panel and I thought I would share this because it might help people! It's not exhaustive but it's the theme:

What keeps me up at night when I'm responsible for an orgs security (or I'm advising the person that is)?

this is a starting
thaddeus e. grugq (@thegrugq) 's Twitter Profile Photo

The constantly changing threat landscape requires eternal vigilance and fast reactions. Why, some of these vulnerabilities have only been public for as little as two years!

edskoudis (@edskoudis) 's Twitter Profile Photo

I talk with a lot of cybersecurity experts, and almost everyone knows about the first of these two cartoons. It's great and a classic. But far fewer know about the second one, which is really quite important right now in our industry. #InjectAllTheThings

I talk with a lot of cybersecurity experts, and almost everyone knows about the first of these two cartoons.  It's great and a classic. But far fewer know about the second one, which is really quite important right now in our industry. #InjectAllTheThings
spencer (@techspence) 's Twitter Profile Photo

Attackers love low-hanging fruit. And insecurely installed 3rd-party software is one of their favorite snacks.. 🧵 Here’s how these issues turn into privesc goldmines (and how to fix them fast)

Attackers love low-hanging fruit.

And insecurely installed 3rd-party software is one of their favorite snacks..

🧵 Here’s how these issues turn into privesc goldmines (and how to fix them fast)
spencer (@techspence) 's Twitter Profile Photo

ps - I created an AD Security resource kit for IT admins. If you want to know where to start & what issues to look for, then this is for you. You can get access to it by signing up for my free email newsletter. If you're already a subscriber, DM me for the link! 👇 Access it

ps - I created an AD Security resource kit for IT admins. If you want to know where to start & what issues to look for, then this is for you. You can get access to it by signing up for my free email newsletter. 

If you're already a subscriber, DM me for the link!

👇 Access it
HotCakeX ✡︎ סגול (@cybercakex) 's Twitter Profile Photo

After Months of Development, FINALLY ready to share: Harden System Security🎉 ✅ Complete System Hardening ✅ Security Posture Analysis ✅ All-in-One Toolkit ✅ Built-in Intune support for Scalability ✅ Beautiful Modern UI ✅ CLI support github.com/HotCakeX/Harde… #Cyber #Windows

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

"How to defend against AI powered attacks? How to defend against ransomware attacks? How to defend against APT attacks? How to defend against cyber attacks? " Over the years we’ve seen it all. There’s no real difference when it comes to protecting your org from these attacks.

"How to defend against AI powered attacks? 
How to defend against ransomware attacks? 
How to defend against APT attacks? 
How to defend against cyber attacks? "

Over the years we’ve seen it all.
There’s no real difference when it comes to protecting your org from these attacks.
Zack Korman (@zackkorman) 's Twitter Profile Photo

I’ve discovered that a lot of IT admins have no idea how to search M365 audit logs so here you go: purview.microsoft.com/audit/auditsea…

Matt Zorich (@reprise_99) 's Twitter Profile Photo

Having responded to probably hundreds of incidents at this point, from ransomware to APT's, in my experience, the lack of knowledge on how to adequately secure Entra applications and service principals continues to be the biggest knowledge gap most defending teams have. You

spencer (@techspence) 's Twitter Profile Photo

Here’s the secret to organizations that are “more secure” than others…. They have people who care, even if they are not rewarded or recognized for it. That’s it. Everything stems from that. People who honor their commitment and responsibilities.

Kostas (@kostastsale) 's Twitter Profile Photo

𝗖𝗹𝗮𝘄𝗱𝗯𝗼𝘁 𝗶𝘀 𝗮𝗻 𝗶𝗻𝗳𝗼𝘀𝘁𝗲𝗮𝗹𝗲𝗿'𝘀 𝗱𝗿𝗲𝗮𝗺 𝘁𝗮𝗿𝗴𝗲𝘁 There have been a lot of conversations in the past couple of days regarding how awesome ClawdBot is. I tried it in order to understand how it works and it's crazy how much you stand to lose if you get

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

The big corpos probably didn’t see it coming that a community of hobbyists could build the most useful tools with AI and end up using the next gen of open source models to run all that stuff on-prem under their desk