How Target was broken into
http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/Here's an interesting writeup on how Target's payment systems were broken into.On a quick glance, it seems unbelievable, but...
View ArticleRecording a PC video output to a DVR
We are looking for a solution to have our windows 7 PCs send a video stream of what is currently on the display to our network DVRs. The dvr is local so bandwidth isn't really an issue. I've looked...
View ArticleWhat are your recommendations for Password Management?
Do you prefer using some type of password management program, and if so, which one? Or, do you go the Excel route and make a spreadsheet then password protect the spreadsheet?Just curious.
View Articleanyone using ThreatGuard
We just surived an IRS audit and I noticed they were testing with a software ThreatGuard.Anyone using this?
View ArticleDon't fall for the latest Paul Walker email about the Viper GT
A fine good day to all Citizens of the SpiceI know that I have seen this email, and now we have word from Symantec Sr Threat Analyst Joseph Graziano (formerly of MessageLabs) that it is bad news. Take...
View ArticleHave anything bad to say about Kaspersky? Say it here!!
I am about to buy Kaspersky for all PC's on my network, and what to hear why I shouldn't before I make a final decision.All input is appreciated. :)
View ArticleDocumenting Job Classes vs. Privileges
Are there any good solutions out there in the field, for documenting and tracking the assignment of various accounts and privileges that should be granted?I am talking about role-based access controls,...
View ArticleNeed CCTV Camera Suggestion For Weird Angle
We are looking to add an additional camera to our existing CCTV setup, but the location and angles are weird.We are looking for suggestions on a camera that matches these specs:BNC outputonboard audio...
View ArticleEGADS! More Banking malware? Tiylon: A Modern Bank Robber
Hello Spiceheads.If we're awake and drawing breath, odds are, someone somewhere is creating something to try to separate you from your hard earned Bitcoins-I mean money.Our man Christian Tripputi...
View ArticleProxy server via Cisco ASA 5515
I am currently running a Apache reverse proxy for a ESRI GIS server and it has been working fine for the last several years.we are now putting up a new ESRI GIS server and have recently installed a...
View ArticleNext Generation Firewall or Unified Threat Management Device suggestions
We are looking to replace our Cisco Firewalls and Web filter. We are looking for an appliance that is first and foremost a replacement for the web filter, but could also be a replacement for our...
View Articleencrypting medical records or other data
Occasionally a client has the need to send medical records and other sensitive data to others via cd\ftp\usb drive. I am looking for recommendations on an easy to use\deploy software for somewhere...
View ArticleCreate a log of Windows Lockouts
Is there a way so log windows locks out with spice works? I need something like a report that will show what users lock themselves out, Date and Time, and how they got locked out. ThanksRich
View ArticlePrevent users from making AD password with company name?
I have searched near and far for an answer to this question and I cannot locate much on the subject.In Active Directory, I would like to prevent users from using our company name in their password.I...
View ArticleSecurity at the Sochi Olympics - two different perspectives
As the Sochi Olympics have been in the news, there was bound to be a security report surrounding the collection of so many people in one region. Just as the reports come out around conferences like...
View ArticleWhy the heck do some web sites have such crazy (insecure) password requirements?
I was setting up access for someone this morning on the US Social Security site for small businesses. They give you an ID and ask for a password. I had to read it twice because I couldn't believe it....
View ArticleFBI: The 10 Criminal Cyber Crime Professions
Here is some ammo to send to your end-users and make it a bit real that cyber crime is an actual industry.The Center for Cyber Forensics and Information Security (CCFIS) reported in a blog: "The FBI...
View ArticleWorst Phishing Scam Of The Week Yet: Cryptolocker
We here at KnowBe4 have been getting a lot of system admins calling us with the request for security awareness training because end users have been tricked into opening up attachments of phishing...
View ArticleIndonesian government supports local hackers, holds national competition.
I found this news in yahoo.http://ph.news.yahoo.com/indonesian-government-supports-local-hackers-113048761.htmlWhat did you say about this Spiceheads?
View ArticlePatch Management for Servers - what do you use?
Wondered what you're all using for patch management for servers?We have a VMware Go Pro subscription and sadly they are discontinuing it from next month.It works great in that it's entirely push and...
View Article