Has anyone used a Juniper MAG2600?
Has anyone used a Juniper MAG2600 for their VPN access to main office? Basically, I am trying to evaluate a few different VPN products as I have about 10 users that work exclusively remotely or part...
View ArticleIntro to Sox Auditing . . .
I've recently begun blogging for Netwrix, and I'm sharing some of the experiences I had in taking a company from a private entity, to one that found itself faced with suddenly going public, and having...
View ArticleCryptolocker
Anyone got infected with the Cryptolocker? What had you done what are the solutions? in one of our branch it is has been infected 2 pc at the moment i took down the vpn with them but i am not secure...
View ArticleWeb Sense and Office 2013
Hi all We have just started using Web Sense Cloud Web Security and are having problems with Office 2013. We use proxy settings given to us by the supplier and it does what it says on the tin, it...
View Articlenetwork security
Consider an ecommerce company, where customers connect to the company web site over internet and provide a user name and password for a private account that is used later for placing orders. Users...
View ArticleWhich laptop encryption software is best?
I am looking at deploying laptop encryption software on our company laptops. I have used SafeBoot in the past, but wanted to get some input from the SpiceWorks community. Thoughts?
View ArticleThe pursuit of plastic: Our uphill battle to compliance
This is the 279th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View ArticleMake sure your users are protecting themselves online with this Onion article
It's almost Friday, so enjoy!http://www.theonion.com/articles/protect-personal-information-online,35036
View ArticleHow do I prevent company's guests from using our businessnetwork cables?
Hi guys, There are invited company guests and interns roaming the building, unchecked and unchallenged, with there own laptops using our business/domain network cables to get internet (so they say)...
View ArticlePoint of Sale Security
I am the IT manager for a small grocery store chain. With the recent news of the Target data breach I wanted to know what I can do to make sure this doesn't happen to us. The point of sale program is...
View ArticleIs this site legit?
Is this site legit? https://shouldichangemypassword.com Is it something worth paying for? I put a few users email addresses in and several of them come up as having issues.
View ArticleFirst Response to: Cryptolocker \ Ransomcrypt \ Encryptor
Greetings Spiceheads of all ages round the world! Remember that line in Beetlegeuse..."whoah...Sandworms...ya hate 'em" Prrrrretty sure we all feel that way about Cryptolocker and it's extended...
View Articlewhats the best way to ensure a file data is not modified
Can I rely on those MD5 checkers, will they always return the same value no matter algorithm to use? Or is there something else I can use to make sure the files are always the same. thanks in advance
View ArticleUSB Lockdown - thoughts & ideas
Hey All! We've decided to investigate the possibility of locking down USB ports to stop data transfer - risk of infection \ loss of corporate data are the motivations. Has anyone had any experiences \...
View ArticleThe Day After: Necessary Steps after a Virus Outbreak
Greetings Spiceheads! I hope this post finds you without ever having had to deal with Cryptolocker. Walking into Spiceworld in October, that was one of the major topics of conversation with many...
View ArticleSecurity +
Where can i be able to download security +,server + and networking study guide ?
View ArticleDespite the News, Your Refrigerator is Not Yet Sending Spam
Dammitman!Oh...sorry...are we on? HELLO my Spicy Spam-hating amigos...Earlier this week, the internets (including ours) were all aflame and, dare I say, a bit giddy, with news of the first confirmed...
View ArticleInternal Social Engineering Test
I have been asked to perform some sort of social engineering test and was wondering what others have used?I'm looking for a basic solution as we do not have to do anything major, something that I can...
View ArticleHow does this qualify as a bug?
http://bits.blogs.nytimes.com/2014/01/22/googles-chrome-browser-could-let-malicious-sites-listen-to-...User asks me about this... I don't exactly see how this is a bug though... "The company added...
View ArticleArg! The cat 'o nine tails for careless clickers!
I was interviewed for CSO Magazine yesterday. This was the headline: "Punish careless employees to reduce security breaches, vendor says."They went on with: "Holding employees accountable for...
View Article