Gateway device review
Hello, I'm an IT Administrator for 4 residence buildings on a university campus. We currently use Astaro boxes as our gateway devices. We've been using them for quite a while but I want to review...
View ArticleWe are talkin' about Security on Tech Talks Live!
For all you followers of the Security Group, this is going to be a GREAT Friday! Why? Because this week’s Tech Talks Live episode is all about Security!Tech Talks Live: Security Friday, Dec. 6 | 10am...
View ArticleSo: Trusteer Rapport. Yea or Nay?
I got this email this morning from the accounting department: "Dear IT Manager, I would like to download Trusteer Rapport to protect our corporate bank account against online fraud. Recommended by our...
View ArticleWindows 7 password crack
Morning folks, This is for personal use, so if this post gets deleted I understand. My girlfriends youngest brother was given a laptop from his older brother, luckily the older brother put himself in...
View ArticleBlock users from accessing Https://facebook.com
hey, I need to block users from accessing facebook, we are using untangle and I know untangle can does this if we upgrade. The problem is we are a charity and have no money, I am looking for something...
View ArticleKeeping Your Data Safe with SSL
HO HO HO....Seasons Greetings my Spicy Elves! Wow...there has been a LOT going on the past couple of weeks with regard to hacks, breaches and other security related activity. That being said, lots of...
View ArticleAll Eyes on Campus Safety - IP Surveillance
"the market for security systems integration in educational institutions is set to expand to $4.9 billion in 2017, up from $2.7 billion in...
View ArticleHow to integrate audio and video to deliver immediate IP surveillance ROI
Hospital case studyhttp://security-today.com/Articles/2012/06/01/End-to-End-Surveillance.aspx "The behavioral health hospitals now have robust, end-to-end surveillance networks founded on 250 D-Link...
View ArticleWebroot not allowing me to click on the drop down box.
Friday Afternoon after a long week....Gone onto WebRoot to give Access for a user to a certain site. When I log into WebRoot put in the site I would like to grant access to then go to the drop down...
View ArticleHow can I stop internet access when people plug their personal laptops in?
We have a seperate building that is part of our hospital network, but doesn't have a wireless ap yet. What I've noticed is some employees decided that to get internet access, they just unplug the work...
View ArticleGood, simple discussion re: Managed vs. Unmanaged Switches and IP Video
http://blog.adiglobal.us/network-switches-for-ip-video-managed-or-unmanaged "Unmanaged switches will work fine for most IP camera/encoder installations where the total IP surveillance device count is...
View ArticleData Security Laws And Penalties: Pay IT Now Or Pay Out Later
Thomas Zeno and Lindsay Holmes wrote a great article over at TechRepublic. You should really dig into it because it provides excellent ammo for more IT security budget. They started out with:Data...
View ArticleIs there a way I can tell if a system has had DBAN or a similar wiping tool used
Is there a way to tell if a system has had DBAN or a similar disk wiping tool ran on it?
View ArticleHealth Care security / screen saver policy suggestions?
I work for a Nursing home, and I have nurses who access the same computers. I'm having an issue figuring out the best way to setup security for them. I have a security policy in place that after 1...
View ArticleMicrosoft Announces the US government as a APT (Advanced Persistent Threat)
http://blogs.technet.com/b/microsoft_blog/archive/2013/12/04/protecting-customer-data-from-government-snooping.aspxhttp://www.zdnet.com/microsoft-us-government-is-an-advanced-persistent-threat-70000240...
View ArticleHas your account been hacked?
I was reading the news feeds when I saw this site. http://haveibeenpwned.com enter in your email address to see if you have been pwned.
View ArticleLooking for a Key FOB Policy
We are jsut starting to setup a Door Key FOB security system. Does anyone have Key FOB Policy already in place that they wouldn't mind sharing. We are looking for something that contains what happens...
View ArticleIs Your IP-Based Surveillance System Stopping or Aiding Criminals?
http://www.disaster-resource.com/articles/07p_096b.shtml " . . it is incumbent upon businesses to take reasonable privacy measures that are governed by sound security procedures. The primary focus of...
View ArticleTwo-Factor Authentication Ballpark Cost?
We are looking into possible implementing two-factor authentication and I have been asked to come up with a ballpark figure of what the cost could be. Does anyone roughly have an idea or could you...
View Article