Outdoor PoE 1080p Surveillance Cameras?
A while back I installed a pretty cheap Samsung surveillance system for a client who was dealing with some petty thefts. It's an analog system that uses CAT5 cable to connect the cameras to the DVR....
View ArticleAngry ex-employee still has email access: Have we been hacked?
This is the 38th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization or MSPs for the series PM Eric to get...
View ArticleWhich SSL cert company should I go with?
We have a management system that has a web front end and SQL as the back end. We have kept outside access locked out, but now we need to allow external access which will involve making the management...
View ArticleHow do i write protect a usb thumb drive from being deleted
i am trying to find a way to write protect a usb thumb drive. I want to load files, write protect, then give them to employees to look at only. Most of the software either write protects it on a...
View ArticleYahoo mail account hacked
Hello all; My friend's yahoo mail account was hacked,but however he has managed to get in. However we found a different email being registred under security settings which we deleted. But when we give...
View ArticleNetwork Security Lunch & Learn Event Topics
Arctic Wolf Networks is considering hosting a network security lunch and learn session/roadshow. This event would not be a sales pitch, but a useful session on helping businesses enhance their...
View ArticleAnyone who runs kaspersky endpoint security on windows 8?
Hope I am not alone waiting for kaspersky endpoint security 10 on windows 8.1...http://support.kaspersky.com/10586
View ArticleNeed Software for File Auditing on Server
I am looking for software to record file activity on my Windows Server 2012R2 server such as read, delete, change. Is there any freeware out there that does this or maybe something that's reasonably...
View ArticlePCI DSS v3.0 Compliance – What’s New? An InfoGraphic
Last month, the PCI Security Standards Council (PCI SSC) officially released the v3.0 compliance standards, but it will take some time before everyone involved (merchants, service providers and...
View ArticleKaspersky replace Esafe ?
At the moment we have Esafe for anti spam solution but the software is going to stop updating half way this year. Now I was thinking about using kaspersky ant-spam module what we already have within...
View ArticleITAR requirements
Hello experts has any of you had to setup your network to be ITAR compliant? I have been doing some research on this and have not found any specific guidelines to follow to be ITAR compliant. All I...
View ArticleMalware to take over a PC - User blissfully unaware
Is anyone aware of any malware whereby a Win7 PC is turned into a "drone" that can load software, download and upload files and generally be used for no-goodness while the user is unaware. Win7 using...
View ArticleMobotix cameras can't add to inventory
I did a scan of my network and I can see the ip address for the cameras. When I put in the http login information it logs in and there is no issue there. The issue is that it does not show any...
View ArticleComputer Start up Circle Dell screen
Hey Spiceheads. I have an issue. I was working on a Dell Inspiron Laptop and all it does is circle to the Dell screen. I tried to re image the computer with no luck as I cannot get into the Bios or...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleVertical Password Guessing Attacks Part II
Grrrrrrreetings Spiceheads.... Today we are back with the second installment from our Senior Security Consultant (read that as resident badass) Vince Kornacki. Vince has been with us for 10 years and...
View ArticleSymantec Security Expert talking mobile security today at 5.00 EST
Sorry for the late notice Spicefolk, but I thought you would be interested in this one. One of Symantec's top Security researchers, Kevin Haley, Director of Security Response, is going to be live on...
View ArticleMake PDF "copy protected" to avoid duplication?
OK, so I know this may sound like a somewhat unusual question. I also know that "trying to keep bits from being copied is like trying to keep water from getting wet". But we have a request here at...
View ArticleReader XI - Do you use Protected View?
Kind of as the subject really. Any issues? Any kickback from end users? I'm trialling it on our test group and so far so good in terms of nothing breaking, though I have had one person complain that...
View ArticleNew startup "Shape Security" uses real-time polymorphic code to stop cybercrime
Anyone read about this yet? It seems pretty exciting, and ZDNet has a good article @ http://www.zdnet.com/shape-security-a-better-security-mousetrap-for-the-enterprise-7000025268/Network World has a...
View Article