The Importance of Two Factor Authentication in Information Security

Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel confident of it or sleep soundly at night thinking that everything is secure, they will likely say: Yes, because I/we use complex … Continued

The Actual Disaster Recovery Plan

Part two of a Disaster Recovery process is the actual plan. You have to look at what could go wrong and either eliminate the possibility it would, or at least lower the impacts. So, if you failed to avoid the problem, you have to have a plan to meet it and deal with it. There’s … Continued

Windows Event Log Forwarding in Windows Server 2008

I love Active Directory auditing. I love it because with just a couple clicks of the mouse I can easily create a policy that immediately gets applied to 500 servers that begins recording useful information on about everything that goes on involving those servers. What I hate about AD auditing is that this useful information … Continued

GLBA Compliance to Secure Consumer Data

The Gramm-Leach-Bliley Act (GLBA) was enacted to protect consumer financial information from mistakes within companies that industry process, transfer, and store massive amounts of consumer data. Disregarding the GLBA requirements for secure consumer data can result in a number of serious consequences: catastrophic data loss, loss of reputation among customers, a $100,000 fine for each … Continued