What's the top security threat that you are budgeting for in 2014?
According to preliminary results from our 2014 IT security budgeting survey, the top 2 threats companies are planning for are targeted phishing attacks and accidental data leaks. Do you agree? Please...
View ArticleLegitimate questions for an applicant or social engineering probe?
Our IT department is expanding and we have begun phone interviews, when the applicants begin to ask questions about our network, legitimate questions mind you, I start to get nervous. How much...
View ArticleKES 10 Web Control Office Files blocking .PDF
We have KES 10 installed. The Default File under Web Control is stopping us from opening certain .PDF images. Without opening a ticket yet with Kaspersky support, we have attempted to create a rule...
View ArticleExperts Address Top IP Surveillance Challenges
Diving into IP Surveillance [resource attached] "Anticipating challenges before they become problems is always a smart approach. In the security world, when a company is making the leap from...
View ArticleIs Your IP-Based Surveillance System Stopping or Aiding Criminals?
http://www.disaster-resource.com/articles/07p_096b.shtml " . . it is incumbent upon businesses to take reasonable privacy measures that are governed by sound security procedures. The primary focus of...
View ArticleCasino IP Surveillance: Does a mix of analog and IP make sense?
". . many casinos find digital systems offer significant benefits like being able to quickly and easily search and review video or tie third party systems (point of sale, access control, slot...
View ArticleVideo Storage Wars - Emerging trends in IP Surveillance Storage
". . this technology [high capacity XC format for SD cards] now allows camera manufacturers to put more features and capabilities at the edge and in the future eliminate NVRs...
View ArticleHow do you manage your client's technical details?
Having recently become self employed (again) I need a more sophisticated way of managing my client's network and technical details. I currently just create a spreadsheet for each client with asset...
View ArticleHealth Care security / screen saver policy suggestions?
I work for a Nursing home, and I have nurses who access the same computers. I'm having an issue figuring out the best way to setup security for them. I have a security policy in place that after 1...
View ArticleCreepware - Who's Watching You?
Warmest Seasonal Spicy Greetings my friends.... In my ongoing quest to keep you abreast of the most useful info from Symantec, I saw this really good, very creepy blog from our Symantec Security...
View ArticleAnyone who runs kaspersky endpoint security on windows 8?
Hope I am not alone waiting for kaspersky endpoint security 10 on windows 8.1...http://support.kaspersky.com/10586
View Article"Best (in general)" 2 Factor Authentication Solution
Hi Team, I'm looking for a good 2 Factor Authentication solution I have in mind:http://www.wrightccs.comhttp://www.securenvoy.comhttp://www2.safenet-inc.com I appreciate your opinion. Thanks guys.
View Article10 Fun Short IT Horror Stories
Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as real. ---1)...
View ArticleWhat was the most annoying IT security threat you experienced in 2013?
Okay, so the year isn't over yet, but I was curious to find out... What was the most annoying/challenging/hair-graying IT security threat you had to deal with this past year? Obviously, a HUGE one was...
View ArticleFull drive encryption with Windows 7 Pro?
Hey all, I'm interested in rolling out full drive encryption for most if not all of our laptops. I'm making this post after seeing few search results on here about Windows 7 pro and drive encryption....
View ArticleRemote Disconnect Users Internet
Hi, We provide a free public access terminal with internet access but there are restrictions and an agreement with the user using the terminal. Long story short I just need a way of cutting off...
View ArticleGMail to allow remote images by default
http://www.wired.com/business/2013/12/gmail-spying-explained/?cid=15695644 Google is going to start allowing remote images by default, this means that spammers who embed remote images in their spam...
View ArticleSpiceworks / Alienvault says "computer has been communicating with... "
An alert from 6 days ago says a computer in our office has been communicating with a suspicious IP. The workstation has Microsoft Security Essentials on it and it's up to date. A full scan completed...
View ArticleComputers show as no Kaspersky installed
Kaspersky AVv6 on workstations; KAK v8.0.2163 on admin servers 2008R2. All workstations show as having AV installed if looked up under their respective Administrative Server ("Administrative...
View Article