Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

Hack attempts ongoing - suggestions for incident response and remediation?

Hi. We are under staffed and our network and server setups are sub-standard to say the least. I just inherited them and help support them, I get very little decision making in the design and my...

View Article


Securing documents at rest

I'm looking for software that would allow someone, when creating a document (before they send it) to specify the other users who are allowed to see it. The ideal solution would allow users to add...

View Article


NetBIOS Security

With the help of this awesome community I solved a drive mapping issue between subnets. The long and short of it was simply to setup WINs and to enable NetBIOS over...

View Article

Home set up security question

I plan on doing a linux firewall installation at home and was wondering if i have the order correct in which the devices will be layed out. My ATT router - im assuming i have to turn this into some...

View Article

Shoretel security is a joke

Here is my conversation with our shoretel partner. Am I wrong to assume that this is a blatantly risky security practice. Does anyone else run shoretel for VoIP? Do you have your firewall disabled...

View Article


USB drives

How do you handle them, from a sec. admin point of view? How do you keep IP form walking out? DO you lock out all drives?

View Article

Watch out if you're trying to DL the latest Java update, site could be a fake!

All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created a fake website to fool users into downloading a virus instead of the latest...

View Article

IS RDP hackable?

I've always wondered, other than someone knowing/guessing/brute forcing a username and password, has rdp been known to be ever traversed via an exploit or the like?

View Article


Kaspersky problems with WMI?

I'm seeing events like this and I'm wondering is this Kaspersky interfering with proper functioning of WMI? Or is this a symptom of a deeper problem on these machines? Here's a sample event log entry...

View Article


Does Google docs meet HIPAA standards and other security regulations?

Does Google docs meet HIPAA standards and other security regulations for a health care organization? Please feel free to make recommendations as to other file storing, easy access and sharing service...

View Article

Encrypt USB Drive with TrueCrypt

Hey Everyone, Im attempting to create a portable encrypted drive on a 1MB USB drive for a staff member using TrueCrypt. Ultimately I would like the staff to just plug the drive in and it prompts them...

View Article

Update your Barracuda Devices!

Barracuda Security Equipment Contains Hardcoded Backdoorshttp://www.informationweek.com/security/vulnerabilities/barracuda-security-equipment-contains-ha/240146890

View Article

Security Alert during Java Update

We are pushing out Java updates silently via Desktop Authority, and the end users are getting a message "Security Alert-Revication information for the security certificate for this site is not...

View Article


Mikrotik Firewall

Hi there , there is a mikrotik in my enterprise as Firewall,if mikrotik firewall professional configured is that enough for threads or we have to buy firewall ??? by the way we have don't any budget...

View Article

McAfee outlines its "Security Connected" platform

In an eWeek article on January 22, McAfee said it plans to expand its current broad portfolio through acquisitions, development projects and partnerships to deliver integrated security solutions....

View Article


Google Bids to Make Passwords Obsolete

Wired writes that Google has come up with a hardware-based authentication process that it thinks is both easy enough to use and powerful enough that people will actually adopt it. Hardware-based...

View Article

Are Your Networked Printers Open To Attack? Better double check.

Information Week article reveals how attackers can exploit HP JetDirect software, used by numerous printer manufacturers, to disable printers, evade physical security checks or recover printed...

View Article


Receiving Files PGP Encrypted files via SFTP - Help!

My company has a need to receive PGP encrypted files daily from one of our providers via SFTP. The files will then need to be decrypted (via automated job hopefully) for upload into an application. I...

View Article

Call for Volunteers: Firewall "What's on your Network?" Series

Hey Spiceheads- We're continuing on with the "What's on your Network" series. The upcoming edition is on "Firewalls," so I'm looking for 3 volunteers who'd be interested in sharing what they use for...

View Article

Large amount of traffic between anti virus server and clients

After viewing some of our network traffic I'm noticing that there are a few clients with very large amounts of communication with our anti virus server, these 2 clients are the top 2 "talkers" on our...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>