Who uses Roboform Everywhere for Work?
I love Roboform and use it to track everything and I have a Everywhere account that is my own. Just curious if anyone uses it to store work related passwords. I find myself on the go with an iPad etc...
View ArticleKaspersky klnagent 100% CPU usage
Ever since I did a deployment to ~30 computers the klnagent.exe has been using 100% CPU and shows no signs of stopping. I had to increase the vCPUs on the guest in order for it to operate properly (so...
View ArticleAnyone know of a good article/document on password generation for users?
I am looking for a article/document on end user password generation for creating secure easy to remember passwords as well as tips for the end user that I can compile and present to our staff.
View ArticleSix Real Security Threats IT Professionals May Face in 2013
Six Real Security Threats IT Professionals May Face in 2013: 1. Targeted espionage 2. Unintentional or accidental loss of that data 3. Denial of Service Attacks (DoS) 4. Understaffed IT team 5....
View ArticleFISMA Certification....anyone?
We are unfortunately in the beginning stages of getting our FISMA Certification.....I got an email requesting that I find out what needs to be done, and how to achieve the certification. A quick...
View ArticleHow gone is gone?
After following this (http://community.spiceworks.com/topic/138965-disk-wipe-software-recommendations?page=3#entry-754879) thread, it sparked a thought. How secure/effective are these? I've personally...
View ArticleAnyone has done before!! to config 2 factor with Cisco SSL VPN
As the subject,Please advise me. -Aye
View ArticleImplementing security with linux
It's a real pleasure to be part of this community and would like to continue with the next case. Currently the corporation for which I work traditionally handled all the safety of navigation, using...
View ArticleWireshark is showing climbing port numbers on every site visited with browser
Some type of outgoing port scan, I have not been able to locate source, ie service producing. Currently, nuke and start over option not acceptable. Suggestions?? Attached screenshot of wireshark.
View ArticleRogue employee attempts to take company data hostage.
Interesting story that happened to me soon after I started the sysadmin role at our company. One of our employees was in charge of programming and overseeing the CNC machines. Over the years we had...
View ArticleHow to fire a sys admin: When IT pros go rogue
This is the 191st article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS, or...
View ArticleWhy do people become malicious hackers?
Tech republic had this interesting article http://www.techrepublic.com/blog/security/hackers-from-innocent-curiosity-to-illegal-activity/9453?tag=nl.e101&s_cid=e101&ttag=e101 While I wouldn't...
View ArticleNeed help choosing UTM and Switches
My father has a new office under construction at the moment. We plan to move in on the 13th. I'm responsible for taking care of his IT requirements. We are setting up a surveillance system comprising...
View ArticleA nice easy report to show who has access to what
I'm hoping that someone here will be able to help me. I have been asked to produce a report that shows which users have access to folders on the network. Certainly to start with I would be looking at...
View ArticleHow do you determine if a cloud storage provider is safe?
Simple enough question you'd think :) You're looking for a cloud storage provider, whether it's for collaboration or for backups or whatever. You look at various vendors from small names to big names...
View ArticlePlease suggest Cheap and Best Data+Database+Email+Files on the Fly Encryption
Can anyone suggest Cheap and Best Data+Database+Email+Files on the Fly Encryption Software or solution. I am planning to implement the same with no or very little cost...Thanks in Advance...responses...
View ArticleHow do I use OpenSSL to convert a PEM cert to a PKCS12?
I have purchased my cert and it's .crt so that appears to be PEM format. I have found on the internet to convert it w/ openssl Convert PEM to PFX openssl pkcs12 -export -out certificate.pfx -inkey...
View ArticleOffice Personnel Panic Buttons
My office is looking at installing Panic buttons for some of our front-office employees. I have never researched options in this area and am just curious if anybody here has installed them? If so, any...
View ArticleCompTIA CASP thoughts
Has anyone taken or thought about taking the CompTIA CASP (CompTIA Advanced Security Practitioner) exam? I was just wondering what your opinions are about it. I know it is supposed to follow the...
View ArticleShoretel security is a joke
Here is my conversation with our shoretel partner. Am I wrong to assume that this is a blatantly risky security practice. Does anyone else run shoretel for VoIP? Do you have your firewall disabled...
View Article