Laptops grew legs...
Over the weekend we had a break in at one of our remote sites. Along with the stuff they took were two nearly new Lenovo Thinkpad's. High End models.. The laptops were being used by two designers....
View ArticleDo you block xls attachments
Do you recommend blocking xls or doc attachments from outside your organization ?
View ArticleHIPAA Compliant Email
Hi, I work for a non-profit organization that deals with PHI. We need to be able to send emails that contain PHI to other providers, schools, parents etc. I have been looking at a lot of solutions for...
View ArticleMissing required Permissions manifest attribute in main jar
I had a problem accessing my Cisco ASDM. I would get the error, "Missing required Permissions manifest attribute in main jar". I looked around trying to find the answer, no luck, so I went onto an...
View ArticleSymantec Endpoint Protection Cloud Service
How many people out there are using the Symantec Endpoint Protection cloud service? I am looking for pros and cons. It's not my call to make the decision not that I am for or against, but I will be...
View ArticleApplication Deployment Versus Information Security
Here's a great question to everyone out there who has to manage software deploymentsHow are you handling security of your critical business system applications versus access to the Information?In my...
View ArticleSticking With WinXP? 10 Things You Must Do
I'm sure you know that April 8 2014, Microsoft will stop supporting Windows XP and stop creating security updates for XP as well. That means that when after April 8, 2014 another security bug is found...
View ArticlePre-installed malware turns up on new phones
A fake version of Netflix that steals personal data and sends it to Russia has been found on several phone modelsDavid Jevans, CTO and founder of Marble Security, recently received some bad feedback...
View ArticleHow insecure is it to bake the key and IV into a program that uses AES/Rijndael?
A vendor recently hand-waved a lot of my questions about his company's software. This software stores user passwords, credit card numbers, and probably other things in reversible encryption of some...
View ArticleAnyone use Mandiant Redline?
I am updating my IR disk and was looking at Mandiant's Redline for Host analysis. Has anyone every used it? Good or bad? Anyone use an alternative for memory forensics?
View ArticleHow anonymous is TOR and ProxyChains for pentesting?
As an entry level in to pentesting and InfoSec- I have setup a small lab for testing out vulnerabilities and such. I use TOR and ProxyChains for obvious reasons. However, I have not tested it outside...
View Articlealternatives to deep freeze
Hello all,I work in a non profit and dont have a huge budget. can you reccommend software that prevents users from making chages to the cmputer?I am using deep freeze now but it isexpensve. thank you!
View ArticleBest Way to Centrally Store Passwords?
All,I'm looking for suggestions on the best way to centrally store a set of passwords for a small IT team (so that the entire IT team can have access to those passwords).Of course, using an Excel or...
View ArticleNeed suggestions for multi user password manager software
Hi, we are looking at replacing our current password management software since it doesnt support multiple users. It can be opened by several users at the same time but the last one to do a save saves...
View ArticleSecuring data from going outside to office.
Hi there,Our environment, We have Windows Server 2012 R2 as a file server and the whole network is in Workgroup.Users used to access the data by the usernames allocated to each.My Question is :...
View ArticleNeed help selecting IP cameras
We have 32 different offices and stores and would like to upgrade our camera systems to IP based. As with most anything electronic there are 1000's of options to choose from. Unfortunately I don't live...
View ArticleData encryption on a mapped drive
What I am looking for is software that will have a user have software on their machine that when a user saves or access data on a mapped drive it will encrypt them. The server does need to see the...
View ArticleDoes anyone still believe passwords are enough to secure a system?
The North Dakota University System (NDUS) is notifying more than 290,000 former and current students and roughly 780 faculty and staff that their personal information – including Social Security...
View ArticleCisco ASA - Public IP Block List
We had a scare on our network today where we thought we might have had a PC with a Crypto Locker infection that, THANKFULLY, turned out to be only the Homeland Security virus and only on one PC. That...
View Article