"The Certificate you are viewing does not match the name of the site..."
Just recently on a couple servers, we started seeing security warnings. They are asking us to verify the certificate for *something*.. problem is that don't recognize the site.. It looks like a...
View ArticleNice to see they still take the time to write..
http://krebsonsecurity.com/2014/06/2014-the-year-extortion-went-mainstream/I'm not from the US but I thought postal fraud was taken very seriously over there?
View ArticleTraveling users
We are going to have users that will travel and do demos. They’llneed admin right to their computer as they’ll need to be able to install anduninstall software for the demos.All our computers are...
View ArticleRemote desktop gateway or VPN client?
HiThis is not so much a question but a discussion: if you want to let consultants in to your network remotely, is it best to use a firewall vpn solution (Checkpoint, Cisco etc) or a SSL encrypted...
View ArticleNew Research shows Employees see no Security Risk in Sharing Work Logins
Our new research report, titled ‘From Brutus to Snowden: a study of insider threat personas‘ sets out to help organizations understand their own users, their attitudes and behavior, in order to know...
View ArticleCryptowall Attack Experience
Hello fellow Spiceheads. I’d just like to relate a little story to you in case it may help you out in the future.We’ve just been hit with the Cryptowall virus/malware/nasty bug/whatever. This nasty is...
View ArticleIn the market for a new system. Recommendations?
We have just gotten word that we need to add a bunch of cameras (putting us around 40 cams), which means that we really need to overhaul our system. We'd like to use our existing cameras if possible...
View ArticleDo Spiceheads use Gartner MQ?
We are wondering if/how you use Gartner Magic Quadrants (MQ) to make IT purchase decisions? Do you find the reports useful? Do you normally agree with Gartner? We want your opinion, and swag will be...
View ArticleKaspersky Endpoint Security 10 for windows version 10.1.0.867 compatiblity issue
please help me if there is any fixes in kaspersky Endpint Security 10 because there is compatibilty issue, when i update windows 8 to windows 8.1 the kaspersky did not work.
View ArticleSecurity Onion and Pfsense
Hey Spicers, it's me again now that I have Pfsense and Security Onion installed, I want to connect snort from pfsense to the snorby that's on security onion, can anyone assist me or point me in the...
View ArticlePublishing certificates to inspect SSL connections and browser trusted root cert
Hi All, I am not very knowledgeable in certificates so any help or advice much appreciated. We are using a fortigate firewall and would like to use SSL inspection where the firewall intercepts SSL...
View ArticleSurvey Results: IT Pros Concern Over Ransomware Skyrocketing
Thanks to the hundreds of you that filled our the Ransomware survey.You should have received the free key for the home internet securitycourse last Friday. Let me know if you did not.Well, the survey...
View Article"The Certificate you are viewing does not match the name of the site..."
Just recently on a couple servers, we started seeing security warnings. They are asking us to verify the certificate for *something*.. problem is that don't recognize the site.. It looks like a...
View ArticleWays to remotely disable a company laptop?
Hey guys, this is the situation i'm in. We recently hired several new Oil rig safety technicians. We issued them laptops, so they can file their daily safety reports etc. One of the guys we hired was...
View ArticleLose Your Data, Lose Your Business
http://chucksblog.emc.com/chucks_blog/2014/06/lose-your-data-lose-your-business.htmlI've posted this here rather than in the Backup forum as I think it goes beyond simply ensuring your have your stuff...
View ArticleMicrosoft EMET - Who's using it?
As subject, particularly interested in your experiences in a corporate environment with a good mixture of weird and unusual niche apps in use.
View ArticleIs physical security really that important?
If you're like me, you probably read the topic title and thought, "What? Are you kidding?" I'm playing a little bit of devil's advocate here. I'm trained in InfoSec so no one is a stronger advocate...
View ArticleUTM versus software/hardware firewall and server routing
We use SonicWalls for each of our sites currently in order to have threat management, routing, and VPN capabilities easily at each site. This works great as an all-in-one feature, and we have very few...
View ArticleProduction log available as attachment on simple google search.
Hi - relatively new user of spiceworks - still trying to find my way around the system and its capabilites.I've been approached by the company's director who advises me that he's seen a production log...
View ArticleStrange activity on our Terminal Server?
After there was a concern following someone in a support role Remoting into our Server when he wasn't supposed to, I've been looking through the TerminalServices-RemoteConnectionManager logs on our...
View Article