Work Cell Phone Security and SOP
Good Morning all, I am looking for any help, advice and/or existing ideas, implementations or SOP's regarding company or business owned cell phone use and especially security. 1. Do you have an SOP in...
View ArticleVendor Security - Or Lack Of
I had some trouble with a vendor this morning and thought I would share my "interesting" experience. I received a call this morning from our mechanic informing me that the update that he needs to run...
View ArticleSecuring the Internet of Things - where's the risk?
Spicy New Year's wishes to one and all! Some good stuff from one of our key Security Strategists in the UK, Sian John. With all the talk about how the Internet of Things is about to take over the...
View Articlelaptop platform of choice for Security Professionals....
I have noticed recently when watching demos, webinars or trainings that most security people that I have come across lately tend to use a Mac. Is this the case or is it just a fluke with who I have...
View ArticleDDOS Attacks
Apparently these guys have been knocking down sites yesterday and today. They hit several gaming sites including Eve...
View ArticleWill the Cryptolocker infect network files via UNC rather than drive mapping
We use UNC access to server rather than mapped drive for most users. Does the Cryptolocker distinguish between Mapping and UNC? Dedup backups; how are they affected?
View ArticleExtending Microsoft Active Directory Security
Knowing who your users are and managing their access rights is central to effective IT security. An article from Quocirca analysts is published today in ComputerWeekly on how Active Directory is just...
View ArticleDoes your management think everything is secure?
I'm pretty sure many of you SpiceHeads don't. We just completed a SpicePanel and, as a result, created an info graphic on the perception and reality of SMB security with the latest stats. Welcome...
View ArticleHow much security is enough?
Hi everyone, happy new year. I'm now managing IT for a small investing/real estate firm that mainly runs Apple devices (Macs, iOS devices). The company also runs a file server that provides internal...
View ArticleSpiceWorks for SW Audits?
OK, here's an InfoWorld article where a writer suggests "soft white lists" as an option to software blocking. The writer writes "I've long been a fan of whitelisting (aka application control)...
View ArticleRidiculous places users store passwords?
Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...
View ArticleIE 10 passing SSL 1.0 packets
I have upgraded a few users to IE10 and they are reporting issues with websites not loading correctly. I initially thought it was a content filter issue with my SonicWall because once I added the...
View ArticleMy PC is part of a Botnet
I've posted this on another social site but have not received any helpful input yet so I'm casting my net wider...Hi there. I cannot sustain a stable VPN connection to a remote office. I successfully...
View ArticleCisco ASA - Public IP Block List
We had a scare on our network today where we thought we might have had a PC with a Crypto Locker infection that, THANKFULLY, turned out to be only the Homeland Security virus and only on one PC. That...
View ArticleIs there anything that isn't hackable any more? SD cards are hackable
Was bumping around the web yesterday and I found this article on ZDnet from Robin Harris:SD cards hacked I put it out on the Symantec Twitter feed and it blew up. Which leads me to believe that folks...
View ArticleHas anybody checked out this website- Have I been Pwned Yet
This website is brilliant - to check if any of your online user names or email address has been pwned. The guy who designed it is a known infosec member as well. What do you guys think about this...
View ArticleTrack IP address of malicious ex-employee
Hi, We believe that an ex-IT employee created a backdoor user that he used to gain access through the VPN and cause some havoc (deleted some AD accounts). We have the IP address in the VPN logs but...
View Articleinstalling Kaspersky endpoint security 10 on server
Hi .. am creating server policy for kaspersky security center 10 to be applied on kaspersky endpoint security 10 installed on different servers with different roles (DC - FS - DHCP - Printing). i used...
View ArticleKES 10 keeps disabling it's self
Since last Tuesday After I talked to Support about my Computers locking up when KES would do it's updates. And the tech made some changes to my Policy by turning off some unneeded components. All of...
View Articlehow to migrate from kaspersky security center 6 to kaspersky security center 10
i have an existing kaspersky 6 server and i want to upgrade to kaspersky 10 ... i have prepared the new server and installed the kaspersky 10 .. policies are ready too .. but how i can upgrade the...
View Article