Kaspersky klnagent 100% CPU usage
Ever since I did a deployment to ~30 computers the klnagent.exe has been using 100% CPU and shows no signs of stopping. I had to increase the vCPUs on the guest in order for it to operate properly (so...
View ArticleHow safe is "ShareFile by CITRIX" to secure files for my banking organization ?
I work for a small community bank. And it has been suggested to possibly implement "ShareFile by Citrix" to our website for our customers to be able to send tax returns as well as financial...
View Article17 laptops: How I spotted a scam and stopped a fraud
This is the 204th article in the Spotlight on IT series. If you'd be interested in writing an article on the subject of backup, security, storage, virtualization, mobile, networking, wireless, cloud...
View Articlegeneral explanation of certificates and security for VPN
Can someone give me a brief explanation of certificates as they apply to VPN connections. Our new firewall supports SSL VPN, and we are trying to set it up in the most secure way possible. I would...
View ArticleCompany Laptop Secure Connection from Home
The company I work for is going to buy me a laptop so that I may do some work remotely. I live an hour away and don't want to spend every holiday up here doing server work. What is the best way to...
View ArticleQ about implementing Bitlocker
Hey guys, We have a variety of Dell machines, some that do include TPM ver 1.2 some that do not include TPM at all. I'd like to encrypt all of the laptop & workstation machines with Bitlocker...
View ArticleIP Camera Software under $500
We are getting ready to install a new camera system here. We will have about 130 cameras spread across a few different sites. We are planning to have them spit as evenly as possible across 5-6 PCs for...
View ArticleShared Passwords
Hey Guys, This is my first post but I had a very important question - What are the requirements for passwords in SOX 404? I am working for a company that has very little unique passwords. All of our...
View ArticleSkype for corporate use....safe?
I have read that Skype uses a peer to peer model that makes it inherently unsafe from a security standpoint. The article even listed a number of incedents where viruses/malware/trojans were spread via...
View ArticleOutlook Encryption... Is there any point?
I have been asked to look into email encryption for our Exchange environment, most of the solutions I have seen require users to send a key to the recipient and have them accept etc etc, is there a...
View ArticleWindows based SFTP for Server 2008 R@. What's a good reliable option?
I am new to SFTP for Windows. What is a good safe windows base program to use that will support Windows Server 2008 R2. Thanks!
View ArticleAny Free software to turn WebCam into Security Camera?
Anyone know of any good free software that would turn a webcam into a security camera? So I can record video when a motion is detected?
View ArticleKaspersky causing lots of problems, even when disabled...
Hey all, hopefully someone can come up with a better solution than I have to my problem. We've just moved to Kaspersky Security Center 10 with Endpoint 10 and it's been doing some really strange...
View ArticleFriday Fun Thread! Help me come up with security questions!
**NOTE TO MODS** Please don't move from the water cooler. I don't think the "Security" area will get the visibility I need, plus I want to keep this fun.*** We are going to be implementing a self...
View ArticleUser Password Management and Security
Today I was tasked with upgrading our GoToMyPC account to a corporate plan and then setting up the 12 users we have to use the new plan. During the process of getting each user to set up a new...
View ArticleVirtual Router to manage multiple WAN ports in SSG
Is it possible to create a virtual router to manage multiple untrust ports and route it to trust so to add WAN connections We are using Juniper SSG20 Thanks
View ArticleGuys what are you most preferred, Shadow defender or Deep freeze?
Hi guys i'm running a computer CAFE and i'm looking for the best software that can roll back the setting of my pc's on its original settings after shutting down so i will prevent viruses.
View ArticleMinimum permission needed to join computer to domain
I have a temporary person that comes in once in a while to do work for us. I absolutely don't want to hand out the domain admin password, so what I do is enable an account I set up for them to use when...
View ArticleKevin Mitnick Details Modern IT Threats; spear phishing and more
One of the most infamous hackers of all time talks about Website security and what users should do to protect themselves. In the world of computer security hackers, few are as well-known as Kevin...
View Article