best way to block Teamviewer in the network
I have a problem with my network users some of them using Team viewer application.So i was wondering if there is any way to block the usage of Teamviewer on the network without affect the normal...
View ArticleCommunicating with the Russians
Hello all,So for the past 2 days I have been getting alerts:(see here for more info)I know some cryptolocker variants are coming from the russian federation, however I am thinking this is a false...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleDNS Redirect Hijack.CMD Malware?
Today at one of our remote sites I attempted to logon to our server remotely only to be notified the credentials were not correct (Of course they were). So then I went to cmd to ping our server only to...
View ArticleHow would you rank this year's biggest IT security threats?
We've been hit with quite a few IT doozies thus far this year. I'm sure there've been some furrowed brows, exasperated sighs, and maybe even a few tears. You all clearly do more for your end users than...
View ArticleBaja Fish taco website botnet alert
Googled "Baja Fish tacos" and went to the first non-ad site for their menu (to see what I wanted for lunch) and got an alert from my Sonicwall blocking me. Message said "Gateway BOTNET Alert" "This...
View ArticleCyrtoware - is it possible to defend by.....
We have not been hit by cryptoware as yet, but I'm sure it's coming some day. In preparation we are listing what we can do to prevent our operation from being hit. Suggestions we have collected...
View ArticleOTFE for USB and External Drives
Good after noon Spiceheads. Since Truecrypt has seemingly has been killed and no longer looking to be supported; I am now in the search for an OTFE that can do the same thing for our companies data....
View Article4 days to pay: What happens when you pay a crypto-ransom?
This is the 331st article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of security, networking, backup, storage, security, virtualization, or MSPs for the...
View ArticleHow to figure out if someone is spying my desktop (in a company environment).
I've been getting some strange flashes on my work pc, just like when the screen definition isadjusted.I've been using "mstsc" since windows 2000 and sometimeswhen an rdp session isdisconnected the...
View ArticleYour choice of Linix/Unix for a web server?
I have been given the task of creating a intranet web site for out hospital. I was wondering what all of you would recommend for a Linux/Unix OS? I am very fluent to Ubuntu server and fedora.
View ArticleFull drive encryption with Windows 7 Pro?
Hey all, I'm interested in rolling out full drive encryption for most if not all of our laptops. I'm making this post after seeing few search results on here about Windows 7 pro and drive encryption....
View ArticleUser Password Resets
Hi.I was just wondering what processes people use to manage requests for user password resets. We get emails (non work email accounts) or calls from people saying they are such & such and have...
View Articlea single phishing email from inside
We run Exchange 2010. An email was auto-sent from one of our user's accounts a couple of hours ago. It was one of those Google Docs phishing scams. I know it came from his account, but I can't find...
View ArticleDOJ: Cryptolocker Trojan Is Now Out Of Commission
The Department of Justice declared victory over the Cryptolocker Trojan, calling its global operation against the Gameover Zeus botnet effective in completely knocking out the infrastructure used to...
View ArticleSuggestions for Wireless IP cameras
We need to setup cameras in remote locations.I think ideally we would install 2.I tried wired cameras, but it was a full day job to install, and some locations are 4 hours away.So, the best solution is...
View ArticleNew IP Security System for organization?
So I've been tasked to redo our non-IP/non-standardized system with a new one for our organization. I'm pretty new to them, as I've only set up a couple at my own home (just cheap foscam ones).We have...
View ArticleSecurity Issue, Firewall Help
Firewall model: Sonicwall NSA2400.I am trying to figure out our firewall to diagnose a possible breach. We have a current rule active to deny all WAN to all LAN for all protocols. I just want to be...
View ArticleRecovered Items for eBay - POS
Along the lines of Avast's project ofrecovering data from wiped phonesfrom eBay, a researcher at HP did the same with a Point-of-Sale device and found the exact same results. Very sensitive information...
View ArticleAdding Kerberos to an existing Network
I am new to Kerberos and would like to add it to my existing network with Active Directory. Before I start this process I would like know about the ramifications. For Example if I just set it up and...
View Article