Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live

HIPAA Compliance for Non-Healthcare Entities? Anyone Else Seeing This?

I work for a IT Solutions company and we currently do not have any healthcare contracts.  My HR Director just called me and told me that we are required to be HIPAA compliant due to one of our health...

View Article


Image may be NSFW.
Clik here to view.

Permanently Decrypt Device Encrypted By Truecrypt

I have been looking for a way to permanently decrypt a device that was encrypted by truecrypt. I have googled around but cant seem to find the answer. Some of the sites I found say to simply right...

View Article


Healthcare providers: How do you secure External Drives & USB Flash Drives?

Is there a way to be notified when an unauthorized external drive or flash drive is plugged into a networked computer? How do you guys block people from plugging in their own devices? Additionally, is...

View Article

Roaming Profile Infections

For the last couple of weeks I have been cleaning pc after pc, sometimes the same machine.MBAMEE picked up a few things in a user's roaming profile. Sure enough the next infection came when they were...

View Article

Mobile Authentication

Hello everyone,I am looking for suggestions on authentications for MDT's in the field. These mobile devices are locked down to docking stations in the squads and only 5 people have keys. According to...

View Article


User Security Meeting

I've never really presented a meeting before, with the exception of small explanations of how things work to the management team.  However, with the threat of Cryptolocker and its subsequent spawns, I...

View Article

Imprivata SSO - Purchase question

So I am reviewing Imprivata as a pure SSO option(no badges or proximity). After finishing my technical and implementation discussions, Imprivata sends over a budget for the software.The budget for...

View Article

Tor - What's your opinion?

I was having a debate with a work colleague today about Tor and its pros and cons and the implications of using it ranging from the end user to the guys running the exit nodes etc.I can see both sides...

View Article


Researcher says well-known antivirus products have security flaws

IDG highlightsresearch byJoxean Koret, a researcher at Singapore security firm COSEINC,who "claims to have found dozens of remotely and locally exploitable vulnerabilities in 14 ...antivirus products...

View Article


Password Management

I keep hearing about people using password managers and how they wished they used them earlier, so how many people use them or what do you use to manage your passwords? As we seem to be getting more...

View Article

Bad news for Tor users

Gizmodo says someone – maybe CERT – has successfully breach the anonymity features of Tor's onion router network. The article links to version upgrades that supposedly close the loophole. Still, one...

View Article

Image may be NSFW.
Clik here to view.

Apps that give you secure/encrypted phone calls and texting for free

Whisper Systems, an Open Source company has announced a new app for the iPhone calledSignalwhich offers free, world-wide, encrypted voice calls. This new app joins their other productRedPhone(for...

View Article

Image may be NSFW.
Clik here to view.

How secure are the mobile apps you use?

I just ran across an app that can tell you how the apps on your phone are working with regard to security. It tells you where they are connecting and if the data leaving your phone is encrypted. I try...

View Article


Regulated industries cloud usage?

If you're in a regulated industry (hospital, food/drug, banking, etc) how are you using the cloud (security, DR, backups, website, etc)?

View Article

PKI SSL Necessary for LDAP(s) connection to hosted provider?

Our website/portal provides an authentication service back to our AD via ldaps.  When we implemented this a few years ago, I was under the impression that I needed a specific type of SSL to accomplish...

View Article


Alienvault reporting that a Teamviewer.com IP is malicious

This appears to be a false positive.  The AlienVault report that I get when I click the link in the Spiceworks console is for an IP 194.42.93.19.  ip-lookup.net provides domain owner info as...

View Article

Infections that don't require admin rights

TL;DR What percentage of current of viruses/malware/etc don't need admin rights in 2014?There was an old article that claimed "90 percent of Windows 7 flaws fixed by removing admin rights" and I'm...

View Article


Vulnerability found in USB

this is not good, at the root this can cause a massive amount of damage. What are your thoughts?http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices...

View Article

Becoming a Penetration Tester

Hello everyone,First a little bit about my self:I have almost 5 years of experience in ITMy job mostly involves configuring networks (Cisco) and managing virtual infrastructure (VMWare)I'm also very...

View Article

java security web issues

hi,got a really really annoying issue with java webi have updated my java version to the latest and have also gone into java in the control panel in windows and and set the "security level" to medium...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>