Responsibility to report?
This may be a better discussion for the water cooler but, I thought this crowd would be best to check with first.Walking into the office I pass a maintenance closet everyday that houses grounds keeping...
View ArticleIs anyone converting their Payment Systems to EMV?
Is anyone out there converting their Payment Systems to EMV? What about restaurant/retail scenarios? Pin entry at table side? What devices are you using? Are they integrated with your POS?
View ArticleASA 5505 - How do you trace back incoming IP address
I have a decommissions webserver, which is offline and the functions were moved to a hosted solution. In the ASA I have an outside rule to the webserver, which still shows requests. We suspect it is an...
View ArticleMultiple security audit failures on domain controller
Hey folks!I took on a new IT position back in December & have been slowly going through things here & putting ducks in rows. I've done quite a bit of "cleaning" here (dns entries were 5 years...
View ArticleUpgrade Kaspersky Security Centre 8 to 10?
Hi,We are looking to upgrade from Kaspersky Security Centre 8 to 10. We are planning on building a test environment (and thus building a fresh server for this project). When testing is completed, how...
View ArticleUser Account and Services Audit Best Practices?
I'm looking into the current practices at work, and finding that what we've got just isn't robust enough. We've got a tendency to miss new accounts and services. If we start using a new product with...
View ArticleCryptoDefense, the CryptoLocker Imitator, Makes Over $34,000 in One Month
Seriously...I think I'm in the wrong business. It's like playing Wac-a-Mole with this stuff.Our personal team of Security Avengers - the Symantec Security Response team - just dropped a blog on the...
View ArticleWhich type of attack do you see the most?
Do you feel chosen for targeted attacks? Are you a bot net target? Is Spearphishing your worst attack? Who do you think is after you? Organized crime? malicious insiders? Hacktivists? Is it the...
View ArticleSuggestions for security audit?
I've been asked to get quotes for a security audit. We need to have someone test for HIPAA compliance. Any suggestions?
View ArticleSED vs TrueCrypt
I was wondering if anyone had any experience with SED's. Currently at my company we use TrueCrypt to perform full drive encryption on all our laptops. Recently I have seen the price of SSD's have...
View ArticlePopcorn Time....not so much!
a carpet walking end user asked me if i would come and type my admin credentials for him. -->cue suspicious muisc<-- he wanted to install a new netflix client -->really, ok i suppose he is...
View ArticleCamera connected to DVR, picture is suddenly dim
This is a single camera hard wired to a fairly cheap DVR. Everything has been working for over a year. A few days ago the image just got dim. At first I thought something was covering the camera,...
View Articlesuspicious IP Alert report
Hi,Spiceworsk seems to have to this great new feature alerting on suspicions IP activity referencing alienvault. Is it possible to run a report on all suspicious alerts and its details?While am at it,...
View Articlebest security tool in case of web malicious, exploitation, etc.
Which is the best antivirus that can stop malicious code attacks by visiting websites, save form exploitation, spy programs and botnets etc. ?
View ArticleRemote Access Policy for Vendor Access
I am concerned with one of my vendors accessing our network. I have them using an SSL VPN client to connect. However, they have shown a lack of concern for security in the past. Not updating there...
View Article"Renewal Notice" Scam
I received this "Renewal Notice" from a company called National Telecompany, Inc. based out of Pasadena, California. My AP dept had received it, stamped it for coding and put in my mailbox to get my...
View ArticleIs this Security Information & Event Management (SIEM) Whitepaper Valuable?
We have recently updated the whitepaper: Network Security Doesn't Scale Down - Why you Need a Concierge SIEM and I'd like to get feedback on how valuable this paper is in explaining the challenges...
View ArticleDomain Service Account - Change Password
We have a domain account that we use to authenticate on numerous appliances/printers. We are planning to change the password. Before doing so is there a way to query where this account is used to...
View ArticleSick of our surveillance setup!!!
Hi all! :) Let me start by saying this is the system that was here long before my time with this company, currently we have two VM's that are running just basic Win 7 Pro, with D-Link ViewCam Studio.We...
View Articlerrsavings crashing web browsers
I had a user today install a freeware pdf to word converter on their system. After the install all web browsers now close after 1-3 mins of use. In event viewer I was able to find this:Faulting...
View Article