Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

What's the top security threat that you are budgeting for in 2014?

According to preliminary results from our 2014 IT security budgeting survey, the top 2 threats companies are planning for are targeted phishing attacks and accidental data leaks. Do you agree? Please...

View Article


Legitimate questions for an applicant or social engineering probe?

Our IT department is expanding and we have begun phone interviews, when the applicants begin to ask questions about our network, legitimate questions mind you, I start to get nervous. How much...

View Article


KES 10 Web Control Office Files blocking .PDF

We have KES 10 installed. The Default File under Web Control is stopping us from opening certain .PDF images. Without opening a ticket yet with Kaspersky support, we have attempted to create a rule...

View Article

Experts Address Top IP Surveillance Challenges

Diving into IP Surveillance [resource attached] "Anticipating challenges before they become problems is always a smart approach. In the security world, when a company is making the leap from...

View Article

Is Your IP-Based Surveillance System Stopping or Aiding Criminals?

http://www.disaster-resource.com/articles/07p_096b.shtml " . . it is incumbent upon businesses to take reasonable privacy measures that are governed by sound security procedures. The primary focus of...

View Article


Casino IP Surveillance: Does a mix of analog and IP make sense?

". . many casinos find digital systems offer significant benefits like being able to quickly and easily search and review video or tie third party systems (point of sale, access control, slot...

View Article

Video Storage Wars - Emerging trends in IP Surveillance Storage

". . this technology [high capacity XC format for SD cards] now allows camera manufacturers to put more features and capabilities at the edge and in the future eliminate NVRs...

View Article

How do you manage your client's technical details?

Having recently become self employed (again) I need a more sophisticated way of managing my client's network and technical details. I currently just create a spreadsheet for each client with asset...

View Article


how do you add a contact with instacom-push to locate ?

Have to do with Security

View Article


Health Care security / screen saver policy suggestions?

I work for a Nursing home, and I have nurses who access the same computers. I'm having an issue figuring out the best way to setup security for them. I have a security policy in place that after 1...

View Article

Creepware - Who's Watching You?

Warmest Seasonal Spicy Greetings my friends.... In my ongoing quest to keep you abreast of the most useful info from Symantec, I saw this really good, very creepy blog from our Symantec Security...

View Article

Anyone who runs kaspersky endpoint security on windows 8?

Hope I am not alone waiting for kaspersky endpoint security 10 on windows 8.1...http://support.kaspersky.com/10586

View Article

"Best (in general)" 2 Factor Authentication Solution

Hi Team, I'm looking for a good 2 Factor Authentication solution I have in mind:http://www.wrightccs.comhttp://www.securenvoy.comhttp://www2.safenet-inc.com I appreciate your opinion. Thanks guys.

View Article


10 Fun Short IT Horror Stories

Here are 10 predictions for 2014, all cyber attacks using social engineering to penetrate the network. Have fun reading, and I will try to report back in 12 months which ones came out as real. ---1)...

View Article

What was the most annoying IT security threat you experienced in 2013?

Okay, so the year isn't over yet, but I was curious to find out... What was the most annoying/challenging/hair-graying IT security threat you had to deal with this past year? Obviously, a HUGE one was...

View Article


Full drive encryption with Windows 7 Pro?

Hey all, I'm interested in rolling out full drive encryption for most if not all of our laptops. I'm making this post after seeing few search results on here about Windows 7 pro and drive encryption....

View Article

Remote Disconnect Users Internet

Hi, We provide a free public access terminal with internet access but there are restrictions and an agreement with the user using the terminal. Long story short I just need a way of cutting off...

View Article


GMail to allow remote images by default

http://www.wired.com/business/2013/12/gmail-spying-explained/?cid=15695644 Google is going to start allowing remote images by default, this means that spammers who embed remote images in their spam...

View Article

Spiceworks / Alienvault says "computer has been communicating with... "

An alert from 6 days ago says a computer in our office has been communicating with a suspicious IP. The workstation has Microsoft Security Essentials on it and it's up to date. A full scan completed...

View Article

Computers show as no Kaspersky installed

Kaspersky AVv6 on workstations; KAK v8.0.2163 on admin servers 2008R2. All workstations show as having AV installed if looked up under their respective Administrative Server ("Administrative...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>