Comcast DTA Box Security (Physical Security Help)
I am having issues with patient families taking the Comcast DTA boxes out of the rooms when someone leaves the retirement home. We need to be able to return these to Comcast, so nothing permanent can...
View ArticleWhat is the best, cost-effective/ easy-to-implement NAC solution?
We are needing to implement some sort of NAC into our network but need some insight on where to start. We already have Sophos and Cymphonix products and both of them have NAC solutions, but are they...
View Articlehow to migrate from kaspersky security center 6 to kaspersky security center 10
i have an existing kaspersky 6 server and i want to upgrade to kaspersky 10 ... i have prepared the new server and installed the kaspersky 10 .. policies are ready too .. but how i can upgrade the...
View Article Contractor & Partner Collaboration v Network Security–do you have to choose?
It is important that there be collaboration between employees, suppliers, and partners, but one must weigh the risk of giving people who are not employees access to your systems, as data can easily be...
View ArticleQuick poll: How many IT security products/solutions do you use today?
I want to pick your guys'/gals' brains!How many different products do you guys use to help protect your business? ie: endpoint, antivirus, disk encryption, wireless, mobile device management, firewall,...
View ArticleRisk Assesment template for a Server
Hi, Does anyone have a risk assessment template or a sample that I could use as a guideline to write a risk assessment report?Thanks in advanceKiran
View ArticleOphcrack failed to crack password
I have a laptop whose windows password needs to be reset. The customer doesnt want to lose any of her files and she does not have a password reset disk. I rab ophcrack but it failed to crack the...
View ArticleHow are you handling HIPAA's latest "Data at Rest" rules?
Our medical practice is faced with becoming compliant with the latest HIPAA, HITECH, and Meaningful Use regulations and one part we're struggling with is how to protect "data at rest", ie data on the...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleFile sharing with people you don't trust?
Curious how people would approach this scenario.We have someone onsite who needs fast (gig ethernet level) access to large files stored "somewhere" which are being exchanged/collaborated on in realtime...
View ArticlePhishing Attack?
I think I know the answer here, but a couple of things happened that have me 2nd guessing myself. My fiancé works for a University here in Minnesota. She had a tech at the school concerned that she...
View ArticleWhat is the recommended fps and Iframe setting rate for warehouse surveillance?
I was thinking about going 10-13fps and 30 I frame interval. Please advice on your experience and thank you in advance.I am using 26 gxv3611 grandstream cameras set to h264 640*480 (4:3)Bit Rate...
View ArticleCisco ASA VPN W/ Windows 8.1
At our company we just received our first two windows 8.1 devices (Surface Pros). We have our ASA 5505 that we use for our remote access VPN for our sales team running version 8.2. We installed Cisco...
View ArticleAny way to tell who modified files?
We have a user claiming someone else modified some files in a network share folder. Is there any way to tell if that user opened or modified those files via event viewer or some other method?This is on...
View ArticleWatchguard Logs
I'm not as familiar as I should be currently with Watchguard. I need to free up disc space on my Win2003 server. The most dominant use of space is the logs for Watchguard. Would it be wise to remove...
View ArticleNext Generation Firewall or Unified Threat Management Device suggestions
We are looking to replace our Cisco Firewalls and Web filter. We are looking for an appliance that is first and foremost a replacement for the web filter, but could also be a replacement for our...
View ArticleCryptolocker Scambles All Legal Files Of US Law Firm
WSOCTV in North Carolina state capital Charlotte reports on a Goodson's, a small US law firm there which stepped forward and bravely admitted that their whole file server was scrambled by Cryptolocker...
View ArticleSecurity at the Sochi Olympics - two different perspectives
As the Sochi Olympics have been in the news, there was bound to be a security report surrounding the collection of so many people in one region. Just as the reports come out around conferences like...
View ArticleSymantec Threat Analyst Stephen Doherty looks at cyberespionage group The Mask
Secure greetings my friends...The bad guys are at it again. Symantec Sr Threat Intelligence Analyst Stephen Doherty takes a good hard look at cyberespionage group The Mask. Check it:The MaskModern...
View ArticleDon't fall for the latest Paul Walker email about the Viper GT
A fine good day to all Citizens of the SpiceI know that I have seen this email, and now we have word from Symantec Sr Threat Analyst Joseph Graziano (formerly of MessageLabs) that it is bad news. Take...
View Article