Quantcast
Channel: General IT Security

Google Home in a residents room

So I work for a nursing home/campus and we are starting to get requests about devices like the Google Home. My first knee jerk reaction is NO!. Our rooms are semi private, so most of the time, the...

View Article


Carbon Black GPO upgrade- Step 2: Leave all machines unprotected??

So once you deploy carbon black sensors via GPO the instructions to upgrade them are:1) Set current GPO to disabled2) force all machines to update policy, uninstalling old sensor3) Deploy new GPO to...

View Article


Como realizar la configuración de politicas en el ASA y proxy inverso

Buenas noches alguien sabe como cofigurar las políticas en el ASA para trabajar en conjunto con un proxy inverso?

View Article

FreeRadius and pfsense and OpenVPN

Anyone have any experience setting up FreeRadius OpenVPN on a pfSense appliance?Good, bad or anywhere in between??I am looking at alternatives to help increase remote user's --hassles-- err I mean...

View Article

Risk Management... Which part do you think is tricky for most orgs?

Much like my morning routine, I savor at least one cup of coffee daily – it’s a non-negotiable. To ensure I get my daily fix, I plan for it thoroughly. I always have a stock of ground coffee and a...

View Article


Beyondtrust Idea - Mobile App T2PSM-1738

Please up vote the following idea if you are a Beyondtrust customer. Upvoting this idea will really help a lot of organizations, thanks!Https:/ Opens a new window/beyondtrust-public.ideas.aha.io

View Article

Image may be NSFW.
Clik here to view.

What are your favorite tips for teaching young people about internet safety?

Today is Safer Internet Day Opens a new window! This 'tech holiday' is meant to serve as a reminder that everyone plays a role in ensuring the Internet is a safe space for all. In today's digital age,...

View Article

Cybersecurity Resiliency and Your Board of Directors

Growing cybersecurity threats, especially ransomware attacks, and the Securities and Exchange Commission’s (SEC) recent rules (https://www.sec.gov/files/rules/final/2023/33-11216.pdf Opens a new...

View Article


How handle user that needs admin rights on Windows desktop?

We have a few users that have local admin rights on their Windows desktops using their domain logins.  I'd like to remove these rights, and give them credentials to a local user on their desktop for...

View Article


WANsdays - "Spam"

Hi, y'all - Chad here. 'Tis the season! No, I'm not talking about Anna Howard Shaw Day. I'm talking about spam, in all its forms, whether physical or electronic. Remember the last time you were...

View Article

How do you protect your data while traveling?

Securing your personal information while traveling is trickier than it seems. While planning out your vacation we hope that staying safe digitally is also on your mind. I know I’m a worrier when...

View Article

How do you report phishing attempts at your organization?

Phishing is one of the more common forms of cyberattacks that cybercriminals use. These attacks most often take place over text, voice, or email messages. In the more high-effort messages, they...

View Article

What are some of your pen-testing pet peeves?

Does it seem like cybersecurity topics can be a bit depressing with all the doom and gloom? Perhaps it's my drive for optimism in the darkest of areas, but, I was hoping we could lighten up the mood...

View Article


Authenticator app that doesn't require a cell phone

A few of our clients require MFA to access their sites. We have been using Authy's desktop app for a few years, but it is going EOL next month. I am looking for an alternative that can either use a...

View Article

Whole IT Infrastructure Rebuild

Hi, I am with a company and currently setting up a new infrastructure. It's not entirely new, but it is kind of a rebuild due to several problems at different levels. I am new here and have found a...

View Article


Encryption at rest

In order to be compliant to certain industry standards, our management is asking our company to encrypt data at rest. We have enabled bitlocker on our workstations. How would you go about encrypting...

View Article

Image may be NSFW.
Clik here to view.

I Got Wazuh up and running over the weekend and.....

It is a remarkable program!That said, I got Wazuh dashboard user admin questions that prevent me from leaving it in service ATM.I would appreciate any help RE default user accounts management. It is...

View Article


Administrator account attempts to login to RD once an hour

I've noticed that on one of our remote desktop servers, there is an login attempt once every an hour at 1:44:00 AM. Does anyone know if this is an actual attack or if some process is causing the admin...

View Article

The Big Divide...How involved has C-suite been with cybersecurity strategy?

I recently learned that 1 in 3 companies lack C-level engagement in their cybersecurity strategy. That's a pretty big divide! When catching up on what the Spiceworks Community has experienced in the...

View Article

Annual Pen test cost

We are starting to do annual pen testing.  Since I am new to the annual pen test requirement, I was wondering what this should cost annually.  I know it depends on a lot of factors so I will give a...

View Article


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>