Ways to remotely disable a company laptop?
Hey guys, this is the situation i'm in. We recently hired several new Oil rig safety technicians. We issued them laptops, so they can file their daily safety reports etc. One of the guys we hired was...
View ArticleSurveillance System Needed
I need to obtain and install a cost effective surveillance camera system (preferably IP cameras) for a retail environment. It also needs to be easy to use when it comes to looking up and saving video...
View ArticleIR Camera Shenanigans
Somewhat recently installed a small camera system in my place of work. Small business. Only four cameras. I can walk to each less than a minute. They seemed to work pretty well out of the box but now...
View ArticleHow tough is the CISM exam?
I have spoken to a few people about the CISSP exam and I think that I understand how difficult it is, but I have not had the same conversations about the CISM. I am just wondering as to how tough it...
View ArticleTop 5 Security Lessons for IT from the Target Data Breach
Although the data breach at retailer Target took place several months ago, new information continues to surface, and the ripples for the IT industry will no doubt continue for a very long time. For...
View ArticleHow to block SCR files via GPO or similar?
Hi all,We are using three separate security products here - iCritical (web filter), Webroot SecureAnywhere (AV) and McAfee SaaS, including ClickProtect (email security).This morning an email slipped...
View ArticleMicrosoft ordered to give US customer e-mails stored abroad
http://www.theguardian.com/technology/2014/jul/31/microsoft-must-handover-overseas-emails-judgehttp://arstechnica.com/tech-policy/2014/07/microsoft-ordered-to-give-us-customer-e-mails-stored-abro...Yo...
View ArticleFinger Print Biometrics for Passwords.
Anyone using these? We are thinking of installing biometrics on the computers for all logins for our employees. The solution we are looking at would have a central server for storing credentials so...
View ArticleSecurity Implications of allowing users access your network via VPN
More and more users are seeking to use remote access technologies to connect to our networks and I think we need to put in place measures to counter any threats. Also do you recommend we will need...
View ArticleDoS attack URGENT
I am currently receiving a DoS attack on port 80 (how typical) I am on ubuntu and limited traffic of port 80 and it successfully blocked the DoS attack from affecting the servers, but the webpage...
View ArticleBest practice to collect child's info (PII) via web form
Hi all,Would appreciate advice from those of you who've dealt with a situation similar to this. One of my non-profit clients asked me to create an online registration form for parents to fill out...
View ArticleHow do you track and manage your IT passwords?
Curious how everyone tracks their passwords that are typically shared with others for administrative purposes. Passwords for say admin server accounts, switches, web portals, etc. We currently use a...
View ArticleNetwork Sniff (TeamViewer)
Hello everyone.I just started a new job as System Administrator but due to some issue in upper management i have more on my plate and have to take care of task for Network admin too. My skills on...
View ArticleHow to secure SBS server 2011 against RDC attempts ?
Im looking for some info on how I can secure an SBS server (2011 std), running exchange 2010, against malicious RDC login attempts without disabling the RDC service. The exchange is configured fully,...
View ArticleSearch for a specific MD5 Value
Alright, I will be honest i have never done this before so i am absolutely clueless, I have been tasked with searching for a specific MD5 has on several systems, but i have no idea where to even start!...
View ArticleSeem I have a routing issue.... Anyone really good with Sonicwalls?
Hey guys, So I seem to have a routing issue. To me the routing on the core MDF which is a HP Procurve 2910al-48G-PoE+ seems to be correct since the switch can ping and access to the Sonicwall (which is...
View Articlessl certificate
hi everyone when trying open outlook form outside I am get this message (the name of the security certificate is invalid or does not match the of the site) i am get this message internally but after...
View ArticleUsing Raspberry Pi's as a Honeypot
I found this on /. today. I think its in interesting idea to create a honeypot network from Raspberry Pi's.http://threatstream.com/blog/create-an-army-of-raspberry-pi-honeypots-on-a-budget
View ArticleWhich Endpoint Security to chose for small business ?
Hello community!We are a small healthcare company and have about 25-30 workstations and 3-4 Servers. For "outside security" we have a Sonicwall TZ200 which ,up to now, has been good enough.Though we do...
View ArticleMost Hackable Cars
Found this on /. and thought it was interesting. To me its a major fail for companies to put inner workings of a Car's PLC that control vital vehicle functions on the same network as in cab equipment....
View Article