So: Trusteer Rapport. Yea or Nay?
I got this email this morning from the accounting department: "Dear IT Manager, I would like to download Trusteer Rapport to protect our corporate bank account against online fraud. Recommended by our...
View Article Contractor & Partner Collaboration v Network Security–do you have to choose?
It is important that there be collaboration between employees, suppliers, and partners, but one must weigh the risk of giving people who are not employees access to your systems, as data can easily be...
View ArticleDocumenting Job Classes vs. Privileges
Are there any good solutions out there in the field, for documenting and tracking the assignment of various accounts and privileges that should be granted?I am talking about role-based access controls,...
View ArticleTwitter Spam Bots Target NFL and Miley Cyrus Fans
Well...I've been in Spiceworks for almost 3 years now...you knew it was coming...at some point... I was going to write about Miley Cirus.The good news is that someone has already done all the writing...
View ArticleIn SanFran? I've got free RSA expo passes for you
Webroot is excited to be returning as sponsor and briefing presenter of the 2014 RSA Conference in San Francisco, California. From February 24th to 27th, the Bay Area will host the popular...
View ArticleIndonesian government supports local hackers, holds national competition.
I found this news in yahoo.http://ph.news.yahoo.com/indonesian-government-supports-local-hackers-113048761.htmlWhat did you say about this Spiceheads?
View Articlelaptop platform of choice for Security Professionals....
I have noticed recently when watching demos, webinars or trainings that most security people that I have come across lately tend to use a Mac. Is this the case or is it just a fluke with who I have...
View Articleexcel 2010 encrypt with password crackable?
I used to encypt with password -one of my confidential excel sheet. But i see there are password crackers available in the internet. Can I just stay with this way of protecting my excel file or are...
View ArticleWorst Phishing Scam Of The Week Yet: Cryptolocker
We here at KnowBe4 have been getting a lot of system admins calling us with the request for security awareness training because end users have been tricked into opening up attachments of phishing...
View ArticleIdeas on in-house email filtering appliance
Hi All, I just wanted to get some thoughts on a solution for an in-house email security appliance. Right now we are using a hosted service that is provided by our consultants. It is a Barracuda email...
View ArticleFeb 1st - Change Your Password Day
What steps are you taking to enforce your password security? We posted some recommendations and free tools to accomplish this: http://blog.netwrix.com/2014/01/31/change-your-password-day/
View ArticleWMI-Traffice encrypted?
Hallo,I am Using spiceworks on a workgroup environment. Only Windows Machines are inventoried over wmi. I gave seperate passwords for every machine using the *enabled* administrator accounts on windows...
View ArticleI need to monitor my Forti Gate firewall memory utilization in Solar Winds
This is intended to those with the experience to provide the answer I need.I monitor my FortiGate Firewall on Solar Wind , I need to also monitor my memory utilization from solar winds so I do not have...
View ArticleRemote computer open ports scan
Hi all,My computer is connected to Wi-Fi router, then Wi-Fi router is connected to ADSL router which from internet provider obtains public IP.When I scan that public IP from online sites there are...
View ArticleFirst Response to: Cryptolocker \ Ransomcrypt \ Encryptor
Greetings Spiceheads of all ages round the world! Remember that line in Beetlegeuse..."whoah...Sandworms...ya hate 'em" Prrrrretty sure we all feel that way about Cryptolocker and it's extended...
View ArticleCisco ASA VPN W/ Windows 8.1
At our company we just received our first two windows 8.1 devices (Surface Pros). We have our ASA 5505 that we use for our remote access VPN for our sales team running version 8.2. We installed Cisco...
View ArticleFBI: The 10 Criminal Cyber Crime Professions
Here is some ammo to send to your end-users and make it a bit real that cyber crime is an actual industry.The Center for Cyber Forensics and Information Security (CCFIS) reported in a blog: "The FBI...
View ArticleScam Of The Week: Funeral Notification
Another one to warn your employees about. The bad guys do not hesitate to exploit the most basic fears of people; the sudden death of a loved one. The message claims to be from a funeral home and...
View ArticleTrueCrypt
We are thinking about adding whole drive encryption to 120 computers on a domain. Is there a way to remotely enter the boottime password truecrypt requires or can that only be done deskside?I am also...
View Article