Video Monitoring Systems
I am currently looking into replacing our VMS, hardware and software. We already have our cameras - currently 40 and all IP - and will probably be close to 60 in the next three years. Ideally the...
View ArticleHow secure is LastPass password manager?
I have seriously been considering using a password manager. I have been looking at KeePass and LastPass, with the latter being cloud-based. The cloud-based part sounds both convenient and scary....
View ArticleProving OS was intentionally damaged
I've got a laptop that came in over the weekend with very odd symptoms. The user has been complaining about her PC since the day it was issued. We replaced it with a newer model and upgraded it and...
View ArticleSecurity - who do you think is responsible?
With the influx of mobile devices in the workplace, IT security is a hot topic that shouldn’t be overlooked. Many times, companies focus security efforts on protecting confidential electronic data on...
View ArticleDoes anyone has experience with Cyberoam security appliances?
I am considering changing our current firewall and web security & email security appliance and Cyberoam was one interesting "All-in-one" device as i checked it.. I saw some older reviews on this...
View ArticleJava Security Updates
We have the latest Java on all the workstations, which is 7 update 25. I hate having java on PCs for security reasons but we have to have it for software we use. I would like to know when the next...
View ArticleUnbranded DVR H.264/16 channel
I was wondering if I can change the Software installed on my DVR, There is one on there now but it does not meet our needs, we have a fancy system (motion tracking and smart recording), but its old...
View ArticleConfused Xerox copiers rewrite documents
I got this today in another group I am inConfused Xerox copiers rewrite documents In tests, it was found that often the number "6" would be turned into an "8", and vice versa, with other numbers being...
View ArticleTroubleshooting Kaspersky Endpoint Security 10
As is typical with any program that touches everything in a system, sometimes (all the time!) the finger gets pointed at the AV subsystem. Since migrating to Kaspersky, our detection rate has been...
View ArticleMonitoring users internet activity
I have a customer that wants to be able to get reports on users internet activity on their individual PC's. i.e. they want to see that their employee Jane went to website xyz.com at 9:30am and was...
View ArticleFinding Geographical IP Addresses
We want to be able to block other countries IPs within our web gateway. We can add ranges to do this, but how can I get a list of a countries ip address range? Where I work this is no need for a user...
View ArticleI am Looking for cyber security consultant for a large firm with 5000 seats
I have a great customer of mine that is looking for someone to hire for some consulting work in the Cyber Security field. They have 5000 active seats right now. Must have experience with this size of...
View ArticleMonitor google talk chats
Hello, I have a client that needs the ability to monitor google talk chats. They have recently had an employee who they believe is leaking vital firm information to an ex-employee. They also requested...
View ArticleI cant convert a SSL crt to PFX! I need HELP with this @#%!(@$*!!!!!
Please I need some help. Customer has purchased an SSL cert via Network Solutions and I need to convert the crt file to pfx so it can be imported onto the remote desktop services server. I have tried...
View ArticlePC compliance - Checkpoint 3D
Hey guys, I was wondering weather there are other software/open source programs that can generate a compliance report on PCs and laptops like the checkpoint 3D?
View ArticleIf you could hack into any system, what would it be?
Hey Spiceheads! If you could hack into any system on the planet, what would it be?
View ArticlePeople will hack anything
I saw this and couldn't believe it. You just can't be too careful no matter where you go.(pun intended)
View ArticleNeeding to record vendor activities on my ubuntu servers. psacct or alternative
Hi AllI have a 3rd party vendor who does remote software maintenance on my ERP system. We are very concerned that a junior tech on their side takes a copy of our database for a "rainy day"Currently, I...
View ArticleDrive Level Encryption
Hello everyone, I'm looking into products to provide drive level encryption and my research has led my to two items (though I'm certainly open to suggestions)- BitLocker and TrueCrypt. It doesn't...
View ArticleInformation Security Officer vs Information Security Analyst
What are the main differences between Information Security Officer and Information Security Analyst ? Are there any ???
View Article