Has anyone thought of Getting an RFID Implant?
Has anyone thought of getting an RFID implant? I've been curious about it. If it has practical uses I would love to get one. Is it too early for the technology to be practical or is their software out...
View ArticleA user I know recently was hit with the Cryptolocker virus.
I have been cleaning things up for several days now and I keep finding these autorun.ini files as shown below:[autorun]open=siaajak.exeaction=1976useautoplay=1Any idea what this is? I have searched...
View ArticleSome people I tell ya
I had a supposedly IT person try and tell me that FREE AV's are just as good as the paid ones. One client even said all of a sudden she was getting pop ups. He said oh change your pop up settings...
View ArticleIP cameras no infrared should I add motion detect lights?
OK so I purchased and installed 25 indoor cameras for the warehouse. They do not have infrared. It would be nice to have some sort of protection at night. Should I add some sort of motion detect...
View ArticleFile sharing with people you don't trust?
Curious how people would approach this scenario.We have someone onsite who needs fast (gig ethernet level) access to large files stored "somewhere" which are being exchanged/collaborated on in realtime...
View ArticleTop 5 Enterprise Threat Predictions for 2014
Last week, our Security Intelligence Director, Grayson Milbourne, wrote up his predictions of the dominant threats for 2014, and I wanted to share them with you all. Even if this helps your reevaluate...
View Articlehow to block a specific website in fortigate 200a
hey all, i saw a guide in fortinet site how to do it in the new firmware version...its not the same...can any one tell me how i do it in the ond version?
View ArticleWhat is the best, cost-effective/ easy-to-implement NAC solution?
We are needing to implement some sort of NAC into our network but need some insight on where to start. We already have Sophos and Cymphonix products and both of them have NAC solutions, but are they...
View Article17 laptops: How I spotted a scam and stopped a fraud
This is the 204th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View ArticleMy 2 cents about insider threat fighting, published by TechRadar
Why a User Access Control Policy is crucial for your organisationAs always, your feedback is most welcome!
View ArticleWhere to start with Encryption
The company I work for needs to revamp out encryption methods. With that being said, I essentially have a clean slate to work with a team and come up with a good solution. Several Questions.1. Before...
View ArticleMulti-User KeePass with granular security - Pleasant Password Server?
We're looking for a password manager and if KeePass had proper per folder or per password permissions it would likely be our first choice.It's a rather specific question but has anyone used...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleCisco Anyconnect VPN secure desktop Android and IOS.
I have and ASA 5510. The starts are as follows. ASA Version, 9.1(4) ASDM Version 7.1(5) Anyconnect client software 3.1.04072 Secure desktop 3.6.6210. We use the ASA to provide an SSL VPN for company...
View ArticleOutdoor PoE 1080p Surveillance Cameras?
A while back I installed a pretty cheap Samsung surveillance system for a client who was dealing with some petty thefts. It's an analog system that uses CAT5 cable to connect the cameras to the DVR....
View ArticleAttachements replaced with cmd.exe ?
Since a couple of months some of my users are receiving mails wherein the attachmensts are replaced with cmd.exe. These files seems be the original windows cmd.exe, VirusTotal does not find any virus...
View ArticleINFOGRAPHIC: The Illusion of Personal Data Security in E-Commerce
Scary ... INFOGRAPHIC: The Illusion of Personal Data Security in E-Commercehttps://www.dashlane.com/blog/2014/01/24/infographic-the-illusion-of-personal-data-security-in-ecomm...I've stopped storing my...
View Articlehow to migrate from kaspersky security center 6 to kaspersky security center 10
i have an existing kaspersky 6 server and i want to upgrade to kaspersky 10 ... i have prepared the new server and installed the kaspersky 10 .. policies are ready too .. but how i can upgrade the...
View ArticleScreensavers/Automatic Lock - What's your policy?
How do you guys implement screensavers and automatic computer locking?Timeouts?Issues (the one that leaps to mind is "What if I'm giving a presentation?")?How to display something corporate vs. a...
View ArticleThe pursuit of plastic: Our uphill battle to compliance
This is the 279th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View Article