Account Credentials Are Hot Hacker Commodity
Just last week, videogame maker Ubisoft reset millions of account holder passwords after attackers gained access to its online network. An unpredictable fluke? Not really. In the 2013 Verizon Data...
View ArticleAny Free software to turn WebCam into Security Camera?
Anyone know of any good free software that would turn a webcam into a security camera? So I can record video when a motion is detected?
View ArticleRecomendación proveedores análisis seguridad perimetral Chile
Estoy buscando un proveedor que me entregue un análisis de nuestra seguridad perimetral (riesgos, ethical hacking, recomendaciones, etc.). ¿Alguna recomendación?
View ArticleAngry ex-employee still has email access: Have we been hacked?
This is the 38th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization or MSPs for the series PM Eric to get...
View ArticleNessus Scan vulnerability Spiceworks
Has anyone ran into this vulnerability on your spiceworks server if so how do i fix it The remote service has one of two configurations that are known to be required for the CRIME attack:– SSL / TLS...
View ArticleMove from windows AD password to pass phrases
I have been looking at changing our password policy to be a bit more beefy. But before we make all of our users cry with longer passwords and longer retention, i have been hearing alot about pass...
View ArticleDMZ to your LAN SQL Backup
HI All, How do i setup FTP to backup files in DMZ to LAN for backup AS
View ArticleConfessions of a cyber warrior
New article up on info world interviewing a nation state hacker. Lots of interesting quotes about the number of 0-day exploits they have and how many exploitable bugs vs lines of code there are. A...
View Articleways to share data, but still have the best possible protection of our data
I was approached today by a user that wants to share data with a customer, but at the same time make sure the data is not lost, copied or abused. I said I did not think it was possible, because once...
View ArticleWhat is everyones prefered UTM appliance.
We have been reselling SonicWALL UTM devices for a good 6 years having previously supplied Juniper. It has been a nice partnership but recently I have had a few oppertunities that the SonicWALL has...
View ArticleKapersky blocking AJAX calls!
our software is a hosted web application which clients access through any modern web browser (mostly IE). i had a client call in complaining that their scheduler page right-click functionality was not...
View ArticleInteresting video about banking/online security
A little extreme for reality, but it certainly makes a good point. I plan to incorporate this in my anti-phishing lunch-and-learn I do every few months for new employees and...
View ArticleSharing this infographic: How Thieves Use Social Media To Rob You
Thieves use social media. Really? It is a large info-graphic but worth the read.http://main.makeuseoflimited.netdna-cdn.com/wp-content/uploads/2013/07/social-media-assisted-thefts-large.jpg
View ArticleHow do you identify users in a BYOD environment?
Our school is going BYOD and I'm anticipating that when I get an alert about any "illicit searching" I won't be able to identify whose activity it is. We use Telemate's NetSpective filter which...
View ArticleDoes anyone have any Web Application Firewalls comparison table?
My customer is in need of Web Application Firewall for his IIS server. Does anyone have a comparison table, of the hardware/software WAF including pricing info?
View ArticleEmail encryption
I have 75 employees and we need to implement email encryption. I am looking for recommendation. Your comments about ease of uses, secure and pricing would be appreciated. Thanks for your help.
View ArticleThe happiest place on earth: How I recovered a stolen laptop
This is the 139th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, DNS,...
View ArticleWOOOOO!! Installing Kaspersky Endpoint Security for testing today!
Just thought I would share that our 3 year subscription to Symantec (decision made before I was here) ends late this year and I got the go ahead to start testing Kaspersky! I have never been so happy...
View ArticleNeed an external secure FTP site
What are some of the solutions that you guys use? I am ideally looking for something free, but it doesn't have to be. username/ pass authentication is a must
View ArticleTwo Factor Authentication for RDP
Looking for some suggestions to use for Two Factor Authentication to a Windows 2008 Server for RDP sessions. Local gov agency so needs to be low budget if possible. Also prefer not to have a separate...
View Article