Security Audit
So my company is going to be taking over IT for a customer (we are a new startup IT Company) and i have been looking into security audit's for e.g. changing Domain admin passwords and removing old...
View ArticleHello.
Hello. I have Draytek Vigor 2920 and I am using it for my default Gateway in my work. I have the same problem every day which is internet down. My ISP says that the problem is not from them because...
View ArticleManaging server passwords in AD
Hi All, I run two Hyper-V servers with a large number of VMs. I am the only human user of these servers. As you can imagine, it is a pain to remember all the passwords of service accounts etc on...
View ArticleWho Is Still Using a DMZ? Why?
Recently before I moved to an environment that was heavily virtualized (95% or more), DMZs were simple to implement because I could just plug a switch into a DMZ port on my security appliance and call...
View ArticlePossible Network Hack Question
The past week I'm noticing over 40+ events of TermService in the event logs under System. The description of the event is: Remote session from client name a exceeded the maximum allowed failed logon...
View ArticleHow are you handling HIPAA's latest "Data at Rest" rules?
Our medical practice is faced with becoming compliant with the latest HIPAA, HITECH, and Meaningful Use regulations and one part we're struggling with is how to protect "data at rest", ie data on the...
View ArticleSocial Security Numbers stored in plain text... bad?!?
I was scanning our file server for un-encrypted Social Security Numbers and Credit Card numbers. During said scan I stumbled across a file that has what looks to be EVERY employees social security...
View Articlecamera surveilance for warehouse
we are getting a request to look at purchasing a camera system with DVR for our warehouse. allow managers to view the production lines, certain doors in the plant, the time clocks, so on. I was...
View ArticleSpiceworks for a hacking/cyber defense competition?
A little background: Last year, I participated in a cyber defense competition, the WRCCDC. College students must defend the network from an active attack, while still maintaining services and...
View Article5 myths about Chinese hackers
http://articles.washingtonpost.com/2013-03-22/opinions/37923854_1_chinese-hackers-cyberattacks-cold-war“The problem isn’t that the Chinese are so skilled; it’s that U.S. companies are so inept”
View ArticleWindows based SFTP for Server 2008 R@. What's a good reliable option?
I am new to SFTP for Windows. What is a good safe windows base program to use that will support Windows Server 2008 R2. Thanks!
View ArticleHow to prevent the help desk user from editing the ticket
how can i deny the helpdesk user from edit the ticket ......he cant delete it but he can edit the ticket and chenge any detils in it ???????
View ArticleFree/Cheaper alternative to Deep Freeze
Anyone? I want a program that rolls back the operating system to a a previous state on reboot. Free would be amazing...cheap would be ok too :)
View ArticleSet Bandwidth Connection for Local User
Hello, I have 2MBPS internet Conection in my Home PC. I want to Set Bandwidth Connection 512 KBPS for only some user accounts. Is there any way to set this on Local Machine.
View ArticleWatchGuard or Cyberoam or what ?
Hi Every One We have 5 Different Locations, Main Office + other 4 Branches, 2 of the branches are connected to the main office through A data only Leased Line, and they have DSL for Internet Browsing,...
View ArticleWhy privacy and transparency matter in world of 24x7 security
Our CEO recently posted an article on our blog about how OpenDNS is building privacy and transparency accommodations into our Umbrella service line. Our recent feature release, selective logging, was...
View ArticleImplementing security with linux
It's a real pleasure to be part of this community and would like to continue with the next case. Currently the corporation for which I work traditionally handled all the safety of navigation, using...
View ArticleData Loss Prevention solutions
I'm researching DLP solutions and welcome your suggestions. We're looking for a product that will manage users taking data off the network via email, thumb drives, printing, FTP, browser, DropBox,...
View ArticleAre you going to ISC West next week? (Las Vegas) - Win new D-Link hardware
We'll be at booth #13119. Come by and see us in person! We're giving away a PoE Gigabit WebSmart switch every day, as well as IP cameras and a Network Video Recorder. Make sure you drop in and say 'hi!"
View ArticleUnsecured and unmanaged: Undoing a mobile endpoint dilemma
This is the 158th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS, or...
View Article