Cyber Chief Magazine: Top trends shaping management priorities in 2020 Download Now
20 December, 2016 | Larry Glusman

Security Practices: 3 Good Reasons to Gap Your Backup

Everyone knows how important it is to back up their data, right? Sadly, I feel like I should laugh after saying that because I know many people that don’t understand this basic concept. If you are reading this though, you are likely in the IT field, so should know that old saying: If you aren’t...
22 February, 2016 | Vlad de Ramos

IT Security Standards: What Is Best for My Organization (Part 1)

While it was a common concern for computing people to implement security measures within their information assets, there has to be a “de facto”, meaning, the standards which focuses on the minimum solutions that addresses information security concerns on an industry or on a regulatory...
17 August, 2015 | Krishna Kumar

Securing SharePoint: How and Why

SharePoint is one of the easiest applications to deploy and install, but it is not easy to configure with full proof security. Many administrators just perform the basic deployment without much security configuration. There is no set configuration to make it fully secure, since every environment is...
17 July, 2015 | Russell Smith

Office of Personnel Management Hacked Again

Not for the first time in the past twelve months the United States Office of Personnel Management (OPM), an independent government agency that manages the civil service, announced 21.5 million background check records were compromised in a security breach, along with 1.1 million fingerprints and...
3 March, 2015 | Russell Smith

4 Ways to Avoid Malware Like Lenovo Superfish

PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...
25 February, 2015 | Richard Muniz

Internet Usage Policy Against Inappropriate Content

A recent posting in Spiceworks caught my attention. It seems that this admin was asked to generate an Internet usage report on a fellow employee. The next thing he knows, the employee was let go. Of course he felt somewhat guilty about it. Another poster was talking about a fellow user who has...
22 January, 2015 | Richard Muniz

Recon as a Hacker's Tool

There’s an expression I always remember from my military days, and it goes like this, “Whoever wins the recon war, wins the war”. This is very true, and nowhere is it truer than in the Wild West world of hacking. But keep in mind that styles vary. Often times this is driven by knowledge and...
13 November, 2014 | Richard Muniz

How to Steal a Virtual Machine in Three Easy Steps

This last week, a thread in Spiceworks discussed a rogue sys admin that had come back to haunt this company. I read through the different threads and one in particular jumped out at me: “You people sound like a bunch of cops. Don’t you trust anyone? In order to trust someone, you must be...
Show more articles