http://articles.mercola.com/sites/articles/archive/2017/01/02/taking-apple-cider-vinegar-at-night.aspx
Baby Spinach Leaves
Some plants have concentrations of micronutrients that are exceptionally high. Tomatoes and lycopene, Brazil nuts and selenium, or limes and vitamin C for instance. Spinach is a great source of several, highly protective nutrients. It contains large amounts of glutathione if eaten raw. It is also an excellent source of magnesium, the eye-protecting carotenoid lutein, as well as calcium and vitamin C. But spinach’s greatest contribution to our body’s nutrient needs might be its potassium nitrate content.
Of course spinach isn’t alone. Swiss chard, beet greens, mustard greens and romaine lettuce are also very high in potassium nitrate. All are excellent choices to eat daily. Potassium is extremely important on its own, but potassium nitrate is unique. This form of potassium is highly effective at helping the body correct major imbalances in the area of hemodynamics. Factors such as blood pressure, platelet aggregation, and a variety of inflammatory mediators need to be constantly adjusted by the body based upon the situation and/or what our diet has been like over the past several days.
Many people eat foods that create significant imbalance. Their blood pressure rises with an inability for the smooth muscle fibers that make up artery walls to relax. Often a number of factors increase an individual’s chances for forming a clot. These are life changing (cerebrovascular accident) and sometimes life-ending process (myocardial infarction) when they occur regularly and/or too intensely.
Enter dark greens, most notably the aforementioned ones that are high in potassium nitrate. When we absorb this form of potassium we immediately get help in the areas needed. Blood pressure drops as nitric oxide production increases and the smooth muscle arterial walls relax. Inflammation is curbed as the antioxidants and essential micronutrients work their free radical-scavenging magic. Platelet aggregation is decreased as both the potassium nitrate and other substances (such tocopherols) thin the blood.
One recent investigation revealed this unique ability to counter the effects of a typical Standard American Diet (SAD). Rats were fed a high fructose-containing diet coupled with a large amount of highly processed fats and oils (this by the way is possibly the most lethal combination of macronutrients in a population’s diet). The results were amazing. The consumption of spinach, rich in potassium nitrate, corrected more than just blood pressure and markers of inflammation, it also significantly improved insulin resistance or reversed processes associated with diabetes.
http://robynobrien.com/the-power-of-dark-greens-and-spinach/
3 ways to protect your business from ransomware
In recent months, ransomware has been increasingly garnering headlines here and across the globe. If you’ve been keeping your head down and believe that it won’t happen to you or your business – now is a good time to think again.
Step 1. Prepare a recovery plan: Recover without paying
- What: Plan for the worst-case scenario and expect that it will happen at any level of the organization.
- Why: This will help your organization:
- Limit damage for the worst-case scenario: Restoring all systems from backups is highly disruptive to business, but it’s still more efficient than trying to do recovery using low-quality attacker-provided decryption tools after paying to get the key. Remember: paying is an uncertain path; you have no guarantee that the attackers’ key will work on all your files, that the tools will work effectively, or the attacker—who may be an amateur using a professional’s toolkit—will act in good faith.
- Limit the financial return for attackers: If an organization can restore business operations without paying, the attack has effectively failed and resulted in zero return on investment for the attackers. This makes it less likely they will target your organization again in the future (and deprives them of funding to attack others). Remember: attackers may still attempt to extort your organization through data disclosure or abusing/selling the stolen data, but this gives them less leverage than possessing the only means of accessing your data and systems.
- How: Organizations should ensure they:
- Register risk. Add ransomware to the risk register as a high-likelihood and high-impact scenario. Track mitigation status via your Enterprise Risk Management (ERM) assessment cycle.
- Define and backup critical business assets. Automatically back up critical assets on a regular schedule, including correct backup of critical dependencies, such as Microsoft Active Directory.
- Protect backups. To safeguard against deliberate erasure and encryption, use offline storage, immutable storage, and/or out-of-band steps (multifactor authentication or PIN) before modifying or erasing online backups.
- Test ‘recover from zero’ scenario. Ensure that your business continuity and disaster recovery (BC/DR) can rapidly bring critical business operations online from zero functionality (all systems down). Conduct practice exercises to validate cross-team processes and technical procedures, including out-of-band employee and customer communications (assume all email and chat are down). Important: protect (or print) supporting documents and systems required for recovery, including restoration-procedure documents, configuration management databases (CMDBs), network diagrams, and SolarWinds instances. Attackers regularly destroy these documents.
- Reduce on-premises exposure. Move data to cloud services with automatic backup and self-service rollback.
Step 2. Limit the scope of damage: Protect privileged roles (starting with IT admins)
- What: Ensure you have strong controls (prevent, detect, respond) for privileged accounts, such as IT admins and other roles with control of business-critical systems.
- Why: This slows or blocks attackers from gaining complete access to steal and encrypt your resources. Taking away the attacker’s ability to use IT admin accounts as a shortcut to resources will drastically lower the chances that they’ll be successful in controlling enough resources to impact your business and demand payment.
- How: Enable elevated security for privileged accounts—tightly protect, closely monitor, and rapidly respond to incidents related to these roles. See Microsoft’s recommended steps that:
- Cover end-to-end session security (including multifactor authentication for admins).
- Protect and monitor identity systems.
- Mitigate lateral traversal.
- Promote rapid threat response.
Step 3. Make it harder to get in: Incrementally remove risks
- What: Prevent a ransomware attacker from entering your environment, as well as rapidly respond to incidents and remove attacker access before they can steal and encrypt data.
- Why: This causes attackers to fail earlier and more often, undermining their profits. While prevention is the preferred outcome, it may not be possible to achieve 100 percent prevention and rapid response across a real-world organization with a complex multi-platform, multi-cloud estate and distributed IT responsibilities.
- How: Identify and execute quick wins that strengthen security controls to prevent entry and rapidly detect and evict attackers, while implementing a sustained program that helps you stay secure. Microsoft recommends following the principles outlined in the Zero Trust strategy. Against ransomware, organizations should prioritize:
- Improving security hygiene by reducing the attack surface and focusing on vulnerability management for assets in their estate.
- Implementing protection, detection, and response controls for digital assets, as well as providing visibility and alerting on attacker activity while responding to active threats.
The takeaway
To counter the threat of ransomware, it’s critical to identify, secure, and be ready to recover high-value assets—whether data or infrastructure—in the likely event of an attack. This requires a sustained effort involving obtaining buy-in from the top level of your organization (like the board) to get IT and security stakeholders working together asking nuanced questions. For example, what are the critical parts of the business that could be disrupted? Which digital assets map to these business segments (files, systems, databases)? How can we secure these assets? This process may be challenging, but it will help set up your organization to make impactful changes using the steps recommended above.
To learn more, visit our page on how to rapidly protect against ransomware and extortion.
To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.