Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

Has anyone used a Juniper MAG2600?

Has anyone used a Juniper MAG2600 for their VPN access to main office? Basically, I am trying to evaluate a few different VPN products as I have about 10 users that work exclusively remotely or part...

View Article


Intro to Sox Auditing . . .

I've recently begun blogging for Netwrix, and I'm sharing some of the experiences I had in taking a company from a private entity, to one that found itself faced with suddenly going public, and having...

View Article


Cryptolocker

Anyone got infected with the Cryptolocker? What had you done what are the solutions? in one of our branch it is has been infected 2 pc at the moment i took down the vpn with them but i am not secure...

View Article

Web Sense and Office 2013

Hi all We have just started using Web Sense Cloud Web Security and are having problems with Office 2013. We use proxy settings given to us by the supplier and it does what it says on the tin, it...

View Article

network security

Consider an ecommerce company, where customers connect to the company web site over internet and provide a user name and password for a private account that is used later for placing orders. Users...

View Article


Which laptop encryption software is best?

I am looking at deploying laptop encryption software on our company laptops. I have used SafeBoot in the past, but wanted to get some input from the SpiceWorks community. Thoughts?

View Article

The pursuit of plastic: Our uphill battle to compliance

This is the 279th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...

View Article

Make sure your users are protecting themselves online with this Onion article

It's almost Friday, so enjoy!http://www.theonion.com/articles/protect-personal-information-online,35036

View Article


How do I prevent company's guests from using our businessnetwork cables?

Hi guys, There are invited company guests and interns roaming the building, unchecked and unchallenged, with there own laptops using our business/domain network cables to get internet (so they say)...

View Article


Point of Sale Security

I am the IT manager for a small grocery store chain. With the recent news of the Target data breach I wanted to know what I can do to make sure this doesn't happen to us. The point of sale program is...

View Article

Is this site legit?

Is this site legit? https://shouldichangemypassword.com Is it something worth paying for? I put a few users email addresses in and several of them come up as having issues.

View Article

First Response to: Cryptolocker \ Ransomcrypt \ Encryptor

Greetings Spiceheads of all ages round the world! Remember that line in Beetlegeuse..."whoah...Sandworms...ya hate 'em" Prrrrretty sure we all feel that way about Cryptolocker and it's extended...

View Article

whats the best way to ensure a file data is not modified

Can I rely on those MD5 checkers, will they always return the same value no matter algorithm to use? Or is there something else I can use to make sure the files are always the same. thanks in advance

View Article


USB Lockdown - thoughts & ideas

Hey All! We've decided to investigate the possibility of locking down USB ports to stop data transfer - risk of infection \ loss of corporate data are the motivations. Has anyone had any experiences \...

View Article

Image may be NSFW.
Clik here to view.

The Day After: Necessary Steps after a Virus Outbreak

Greetings Spiceheads! I hope this post finds you without ever having had to deal with Cryptolocker.  Walking into Spiceworld in October, that was one of the major topics of conversation with many...

View Article


Security +

Where can i be able to download security +,server + and networking study guide ?

View Article

Image may be NSFW.
Clik here to view.

Despite the News, Your Refrigerator is Not Yet Sending Spam

Dammitman!Oh...sorry...are we on?  HELLO my Spicy Spam-hating amigos...Earlier this week, the internets (including ours) were all aflame and, dare I say, a bit giddy, with news of the first confirmed...

View Article


Internal Social Engineering Test

I have been asked to perform some sort of social engineering test and was wondering what others have used?I'm looking for a basic solution as we do not have to do anything major, something that I can...

View Article

How does this qualify as a bug?

http://bits.blogs.nytimes.com/2014/01/22/googles-chrome-browser-could-let-malicious-sites-listen-to-...User asks me about this... I don't exactly see how this is a bug though... "The company added...

View Article

Arg! The cat 'o nine tails for careless clickers!

I was interviewed for CSO Magazine yesterday. This was the headline: "Punish careless employees to reduce security breaches, vendor says."They went on with: "Holding employees accountable for...

View Article
Browsing all 7477 articles
Browse latest View live