Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

CEO says Give Full Admin Access to domain to third party non-contract tech

So what do you do? These techs hit a UAC prompt, don't have the credentials, immediately go to the CEO of the company entirely bypassing IT.

View Article


What happens when you don't check your web developer's work? This.

A close friend called and said that their new web site was hacked. I was scheduled to scan their site as a favor before going live but marketing thought it was ready to go...okay. Site started to...

View Article


D-Link IP Surveillance

If anyone is interested in looking at the D-Link IP Surveillance offerings I'd be more than happy to help. We have spent the last year working with Nexus Globalnet and D-Link on installations around...

View Article

Need help from the Spiceheads

Hello everyone and thank you in advance. I am going to have to put together some pretty ridiculous segragations in a very near future and am looking for your thoughts/knowledge on this one....

View Article

17 laptops: How I spotted a scam and stopped a fraud

This is the 204th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...

View Article


Kevin Mitnick And I Were on FOX TV Wednesday

Kevin Mitnick and I were both interviewed on FOX TV this week about how to fight hackers, and what hackers are after these days. You will see Kevin, me, the KnowBe4 office and some of the KnowBe4...

View Article

Physical security

We're a two man team for our IT department, and we also oversee the security cameras at our company. We've been having some serious issues (cars stolen, intruders, etc) and its happening more and...

View Article

Decent IP camera?

My colleague and I need to install some IP cameras in our key wiring closets which aren't 100% secure from other employees or guests - we have a few switches in housekeeping/storage closets, etc.,...

View Article


how to find pushdo botnet on network

Need some help with this.... Thanks

View Article


general explanation of certificates and security for VPN

Can someone give me a brief explanation of certificates as they apply to VPN connections. Our new firewall supports SSL VPN, and we are trying to set it up in the most secure way possible. I would...

View Article

Apparent Wireless Rogue Access Point

I live in a densely populated urban, highly wired international community where just finding a relatively tidy wireless configuration is a trial in itself, but lately there's been an new chipset...

View Article

Image may be NSFW.
Clik here to view.

Did you miss it? Tech Talks Live: Security

Our latest episode of Tech Talks Live (Spiceworks' very own talk show for IT pros) happened this past Wednesday. But fret not! If you missed it, check out "Security: Get the Lowdown on the Lockdown"...

View Article

looking for best captive portal tool for office

Dear All, couple of weeks back I have asked the community for steps to secure wireless connectivity, one of the key step was deploying captive portal. since then I am searching on internet for a good...

View Article


Email encryption

I have 75 employees and we need to implement email encryption. I am looking for recommendation. Your comments about ease of uses, secure and pricing would be appreciated. Thanks for your help.

View Article

Internet proxy/reporting

Hi guys, I'm in dire need of a proxy and reporting tool for Internet for a Windows based environment. Basically I need to allow/disallow certain users (or groups) internet access, and be able to...

View Article


Does anyone has experience with Cyberoam security appliances?

I am considering changing our current firewall and web security & email security appliance and Cyberoam was one interesting "All-in-one" device as i checked it.. I saw some older reviews on this...

View Article

All about cryptography

Although I am in the IT end of things, I am getting more interested in Cryptography. Being in the beginner's level of cryptography, I would like to get to know more about how can one become more...

View Article


Data at Rest PHI/PII scanner....

I would like to use a product that I can point a scanner at my network drive(s) and it will scan and try to identify PHI/PII with some rules that I can edit. Is there such a product?

View Article

Java, can't Iive without out it, can't be secure with it!

New update patches 40 issues 37 of which can remotely exploitable without authenticationhttp://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html

View Article

DMZ to your LAN SQL Backup

HI All, How do i setup FTP to backup files in DMZ to LAN for backup AS

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>