CEO says Give Full Admin Access to domain to third party non-contract tech
So what do you do? These techs hit a UAC prompt, don't have the credentials, immediately go to the CEO of the company entirely bypassing IT.
View ArticleWhat happens when you don't check your web developer's work? This.
A close friend called and said that their new web site was hacked. I was scheduled to scan their site as a favor before going live but marketing thought it was ready to go...okay. Site started to...
View ArticleD-Link IP Surveillance
If anyone is interested in looking at the D-Link IP Surveillance offerings I'd be more than happy to help. We have spent the last year working with Nexus Globalnet and D-Link on installations around...
View ArticleNeed help from the Spiceheads
Hello everyone and thank you in advance. I am going to have to put together some pretty ridiculous segragations in a very near future and am looking for your thoughts/knowledge on this one....
View Article17 laptops: How I spotted a scam and stopped a fraud
This is the 204th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View ArticleKevin Mitnick And I Were on FOX TV Wednesday
Kevin Mitnick and I were both interviewed on FOX TV this week about how to fight hackers, and what hackers are after these days. You will see Kevin, me, the KnowBe4 office and some of the KnowBe4...
View ArticlePhysical security
We're a two man team for our IT department, and we also oversee the security cameras at our company. We've been having some serious issues (cars stolen, intruders, etc) and its happening more and...
View ArticleDecent IP camera?
My colleague and I need to install some IP cameras in our key wiring closets which aren't 100% secure from other employees or guests - we have a few switches in housekeeping/storage closets, etc.,...
View Articlegeneral explanation of certificates and security for VPN
Can someone give me a brief explanation of certificates as they apply to VPN connections. Our new firewall supports SSL VPN, and we are trying to set it up in the most secure way possible. I would...
View ArticleApparent Wireless Rogue Access Point
I live in a densely populated urban, highly wired international community where just finding a relatively tidy wireless configuration is a trial in itself, but lately there's been an new chipset...
View ArticleDid you miss it? Tech Talks Live: Security
Our latest episode of Tech Talks Live (Spiceworks' very own talk show for IT pros) happened this past Wednesday. But fret not! If you missed it, check out "Security: Get the Lowdown on the Lockdown"...
View Articlelooking for best captive portal tool for office
Dear All, couple of weeks back I have asked the community for steps to secure wireless connectivity, one of the key step was deploying captive portal. since then I am searching on internet for a good...
View ArticleEmail encryption
I have 75 employees and we need to implement email encryption. I am looking for recommendation. Your comments about ease of uses, secure and pricing would be appreciated. Thanks for your help.
View ArticleInternet proxy/reporting
Hi guys, I'm in dire need of a proxy and reporting tool for Internet for a Windows based environment. Basically I need to allow/disallow certain users (or groups) internet access, and be able to...
View ArticleDoes anyone has experience with Cyberoam security appliances?
I am considering changing our current firewall and web security & email security appliance and Cyberoam was one interesting "All-in-one" device as i checked it.. I saw some older reviews on this...
View ArticleAll about cryptography
Although I am in the IT end of things, I am getting more interested in Cryptography. Being in the beginner's level of cryptography, I would like to get to know more about how can one become more...
View ArticleData at Rest PHI/PII scanner....
I would like to use a product that I can point a scanner at my network drive(s) and it will scan and try to identify PHI/PII with some rules that I can edit. Is there such a product?
View ArticleJava, can't Iive without out it, can't be secure with it!
New update patches 40 issues 37 of which can remotely exploitable without authenticationhttp://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html
View ArticleDMZ to your LAN SQL Backup
HI All, How do i setup FTP to backup files in DMZ to LAN for backup AS
View Article