Quantcast
Channel: Spiceworks Community
Browsing all 7477 articles
Browse latest View live
↧

Work Cell Phone Security and SOP

Good Morning all, I am looking for any help, advice and/or existing ideas, implementations or SOP's regarding company or business owned cell phone use and especially security. 1. Do you have an SOP in...

View Article


Vendor Security - Or Lack Of

I had some trouble with a vendor this morning and thought I would share my "interesting" experience. I received a call this morning from our mechanic informing me that the update that he needs to run...

View Article


Securing the Internet of Things - where's the risk?

Spicy New Year's wishes to one and all! Some good stuff from one of our key Security Strategists in the UK, Sian John. With all the talk about how the Internet of Things is about to take over the...

View Article

laptop platform of choice for Security Professionals....

I have noticed recently when watching demos, webinars or trainings that most security people that I have come across lately tend to use a Mac. Is this the case or is it just a fluke with who I have...

View Article

DDOS Attacks

Apparently these guys have been knocking down sites yesterday and today. They hit several gaming sites including Eve...

View Article


Will the Cryptolocker infect network files via UNC rather than drive mapping

We use UNC access to server rather than mapped drive for most users. Does the Cryptolocker distinguish between Mapping and UNC? Dedup backups; how are they affected?

View Article

Extending Microsoft Active Directory Security

Knowing who your users are and managing their access rights is central to effective IT security. An article from Quocirca analysts is published today in ComputerWeekly on how Active Directory is just...

View Article

Does your management think everything is secure?

I'm pretty sure many of you SpiceHeads don't. We just completed a SpicePanel and, as a result, created an info graphic on the perception and reality of SMB security with the latest stats. Welcome...

View Article


How much security is enough?

Hi everyone, happy new year. I'm now managing IT for a small investing/real estate firm that mainly runs Apple devices (Macs, iOS devices). The company also runs a file server that provides internal...

View Article


SpiceWorks for SW Audits?

OK, here's an InfoWorld article where a writer suggests "soft white lists" as an option to software blocking. The writer writes "I've long been a fan of whitelisting (aka application control)...

View Article

Ridiculous places users store passwords?

Hey there Spiceheads! The creative team at Spiceworks Studios is making a fun commercial for our friends over at Ping Identity and we need your help! The topic? Crazy (some would say stupid) places...

View Article

IE 10 passing SSL 1.0 packets

I have upgraded a few users to IE10 and they are reporting issues with websites not loading correctly. I initially thought it was a content filter issue with my SonicWall because once I added the...

View Article

My PC is part of a Botnet

I've posted this on another social site but have not received any helpful input yet so I'm casting my net wider...Hi there. I cannot sustain a stable VPN connection to a remote office. I successfully...

View Article


Cisco ASA - Public IP Block List

We had a scare on our network today where we thought we might have had a PC with a Crypto Locker infection that, THANKFULLY, turned out to be only the Homeland Security virus and only on one PC. That...

View Article

Is there anything that isn't hackable any more? SD cards are hackable

Was bumping around the web yesterday and I found this article on ZDnet from Robin Harris:SD cards hacked I put it out on the Symantec Twitter feed and it blew up. Which leads me to believe that folks...

View Article


Has anybody checked out this website- Have I been Pwned Yet

This website is brilliant - to check if any of your online user names or email address has been pwned. The guy who designed it is a known infosec member as well. What do you guys think about this...

View Article

Track IP address of malicious ex-employee

Hi, We believe that an ex-IT employee created a backdoor user that he used to gain access through the VPN and cause some havoc (deleted some AD accounts). We have the IP address in the VPN logs but...

View Article


installing Kaspersky endpoint security 10 on server

Hi .. am creating server policy for kaspersky security center 10 to be applied on kaspersky endpoint security 10 installed on different servers with different roles (DC - FS - DHCP - Printing). i used...

View Article

KES 10 keeps disabling it's self

Since last Tuesday After I talked to Support about my Computers locking up when KES would do it's updates. And the tech made some changes to my Policy by turning off some unneeded components. All of...

View Article

how to migrate from kaspersky security center 6 to kaspersky security center 10

i have an existing kaspersky 6 server and i want to upgrade to kaspersky 10 ... i have prepared the new server and installed the kaspersky 10 .. policies are ready too .. but how i can upgrade the...

View Article
Browsing all 7477 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>