Check this out in Contests!
http://community.spiceworks.com/topic/514416-200-amazon-gift-card-and-great-security-compliance-info...
View ArticleMDM and Certificate Security
Am I the only one who's skin crawls at the idea of storing user authentication certificates in the cloud as part of an MDM solution? We are a small shop and we try to keep it tightly secured, but most...
View ArticleBotnet Somewhere
I post with great desperation and am in need of some serious assistance. One of the computers is infected with some botnet that is reaching out to two different sinkhole ip addresses. I know this...
View ArticleKids use ATM manual to pwn ATM
They found a manual online for an ATM and used it to gain full access to that ATM.One thing is for sure. This is a MAJOR fail for this bank. It really shows how poor their security practices...
View ArticleIs RAID required for cctv storage
we are an FMCG company using IP cameras, we are storing 30 days of data at 20 fps, i was having a debate with one of my colleague, where he was telling me to have the RAID for the cctv storage, and i...
View ArticleWould bandwidth use tools help with Crypto viruses?
After having had 3 clients hit with crypto viruses in the last 3 weeks (good backups, so tears minimized), I am wondering if there are any tools available that would detect multiple files written to a...
View ArticleCamera pricing and selection....What is out there?
Hello Everyone,I have some camera types in mind 180*, 360* wall mount, ceiling mount, PTZ and such.Does anyone have recent price sheets for any IP cameras. No make preference at the moment. Building a...
View ArticleBREAKING NEWS: TweetDeck vulnerability lets attackers execute code remotely
Hey SocialSpiceHeads...this article popped on The Verge about an hour ago:TweetDeck vulnerability lets attackers execute coderemotelyA newly discovered vulnerability in TweetDeck is allowing attackers...
View ArticleHow do you track and manage your IT passwords?
Curious how everyone tracks their passwords that are typically shared with others for administrative purposes. Passwords for say admin server accounts, switches, web portals, etc. We currently use a...
View ArticleCryptolocker Removal methods/tools/decryption tools
Hi all,A few users clicked a rogue voicemail link and got infected with the Cryptolocker virus. Luckily, we were able to catch it before it effected too many files and folders. I managed to clean off...
View ArticleCryptolocker Protection
If a file or folder is already encrypted, can it be encrypted again by a process like Cryptolocker? Is there such a thing as double encryption or is it encrypted once and then completely unchangeable...
View ArticleLog student web activity on chromebooks
I have approximately 300 chromebooks on my network used by students. I have a couple hundred windows machines using active directory. I need a method for logging all web activity including which...
View ArticleCryptolocker file decryption
We had a cryptolocker infection a while ago and due to faulty backups had to pay the ransom to get our files decrypted. We have one file left over that has not been decrypted but we have the private...
View ArticleAlienVault Hosts on Your Network Impacted by Threat: 0 Always
Good morning!Beautiful Monday, At least here and for me...This behavior started recently although I cannot give a specific date.Going from SW Alert, clicking on it bring me to all the info provided by...
View ArticleCryptolocker - Have you paid?
How many have paid the ransom? Just wondering if anyone has or not.. Out of curiosity..
View ArticleP.F. Changs Credit Card Breach
It looks like P.F. Changs is the latest to be affected by a credit card breach. On June 9, thousands of newly-stolen credit and debit cards went up for sale on rescator.so, the same underground store...
View ArticleWatchguard SSL100 Replacement
I have been tasked with replacing our aging Watchguard SSL100 appliance with something new, we are fed up with the Watchguard product and have decided to move to a new company. Currently were looking...
View ArticleMobile Spiceworks
Do any of you have firewall ports open for Spiceworks mobile?What additional steps did you do to make it secure?I'm probably going to pass on the idea but thought I would check first.
View ArticleHow to keep HIPAA and Windows XP on the same network
I'm talking with a small medical office that has one PC left running Windows XP that cannot be upgraded/replaced cost effectively. According to the vendor every last piece of equipment that connects to...
View ArticleWOOOOO!! Installing Kaspersky Endpoint Security for testing today!
Just thought I would share that our 3 year subscription to Symantec (decision made before I was here) ends late this year and I got the go ahead to start testing Kaspersky! I have never been so happy...
View Article