HIPAA Compliance for Non-Healthcare Entities? Anyone Else Seeing This?
I work for a IT Solutions company and we currently do not have any healthcare contracts. My HR Director just called me and told me that we are required to be HIPAA compliant due to one of our health...
View ArticlePermanently Decrypt Device Encrypted By Truecrypt
I have been looking for a way to permanently decrypt a device that was encrypted by truecrypt. I have googled around but cant seem to find the answer. Some of the sites I found say to simply right...
View ArticleHealthcare providers: How do you secure External Drives & USB Flash Drives?
Is there a way to be notified when an unauthorized external drive or flash drive is plugged into a networked computer? How do you guys block people from plugging in their own devices? Additionally, is...
View ArticleRoaming Profile Infections
For the last couple of weeks I have been cleaning pc after pc, sometimes the same machine.MBAMEE picked up a few things in a user's roaming profile. Sure enough the next infection came when they were...
View ArticleMobile Authentication
Hello everyone,I am looking for suggestions on authentications for MDT's in the field. These mobile devices are locked down to docking stations in the squads and only 5 people have keys. According to...
View ArticleUser Security Meeting
I've never really presented a meeting before, with the exception of small explanations of how things work to the management team. However, with the threat of Cryptolocker and its subsequent spawns, I...
View ArticleImprivata SSO - Purchase question
So I am reviewing Imprivata as a pure SSO option(no badges or proximity). After finishing my technical and implementation discussions, Imprivata sends over a budget for the software.The budget for...
View ArticleTor - What's your opinion?
I was having a debate with a work colleague today about Tor and its pros and cons and the implications of using it ranging from the end user to the guys running the exit nodes etc.I can see both sides...
View ArticleResearcher says well-known antivirus products have security flaws
IDG highlightsresearch byJoxean Koret, a researcher at Singapore security firm COSEINC,who "claims to have found dozens of remotely and locally exploitable vulnerabilities in 14 ...antivirus products...
View ArticlePassword Management
I keep hearing about people using password managers and how they wished they used them earlier, so how many people use them or what do you use to manage your passwords? As we seem to be getting more...
View ArticleBad news for Tor users
Gizmodo says someone – maybe CERT – has successfully breach the anonymity features of Tor's onion router network. The article links to version upgrades that supposedly close the loophole. Still, one...
View ArticleApps that give you secure/encrypted phone calls and texting for free
Whisper Systems, an Open Source company has announced a new app for the iPhone calledSignalwhich offers free, world-wide, encrypted voice calls. This new app joins their other productRedPhone(for...
View ArticleHow secure are the mobile apps you use?
I just ran across an app that can tell you how the apps on your phone are working with regard to security. It tells you where they are connecting and if the data leaving your phone is encrypted. I try...
View ArticleRegulated industries cloud usage?
If you're in a regulated industry (hospital, food/drug, banking, etc) how are you using the cloud (security, DR, backups, website, etc)?
View ArticlePKI SSL Necessary for LDAP(s) connection to hosted provider?
Our website/portal provides an authentication service back to our AD via ldaps. When we implemented this a few years ago, I was under the impression that I needed a specific type of SSL to accomplish...
View ArticleAlienvault reporting that a Teamviewer.com IP is malicious
This appears to be a false positive. The AlienVault report that I get when I click the link in the Spiceworks console is for an IP 194.42.93.19. ip-lookup.net provides domain owner info as...
View ArticleInfections that don't require admin rights
TL;DR What percentage of current of viruses/malware/etc don't need admin rights in 2014?There was an old article that claimed "90 percent of Windows 7 flaws fixed by removing admin rights" and I'm...
View ArticleVulnerability found in USB
this is not good, at the root this can cause a massive amount of damage. What are your thoughts?http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices...
View ArticleBecoming a Penetration Tester
Hello everyone,First a little bit about my self:I have almost 5 years of experience in ITMy job mostly involves configuring networks (Cisco) and managing virtual infrastructure (VMWare)I'm also very...
View Articlejava security web issues
hi,got a really really annoying issue with java webi have updated my java version to the latest and have also gone into java in the control panel in windows and and set the "security level" to medium...
View Article