Preparation for mock security audit
My org is having a mock security audit tomorrow. Anyone here have advice as to how I should prepare? Should I have any reports ready for the security group or should I just let them lead the way?...
View ArticleOld viruses gaining new life thanks to the Internet of Things
Excerpts fromSoftpedia coverage: A company called iPower Technologies has discovered that body camerassold by Martel Electronics come pre-infected with the Conficker worm. In terms of malware,...
View ArticleMDM - What do you do with yours?
We're looking for an MDM solution that supports iOS, Android, and Windows Phone.For both company phones and to allow access to a secure mail container on personal handsets.Having rolled out a trial...
View ArticleMicrosoft removes ransomware from 24,000 computers
Microsoft todayannouncedthat it has removed ransomware from 24,000 Windows machines this yearwith the Microsoft Malicious Software Removal Tool (MSRT), a virus removal tool built into the Windows...
View ArticleAccess Authorization Automation and Tracking
Hi All,I could really use your help. I am looking for a way to automatically track access authorization for new users and transferring employees. There are certain systems and resources in our...
View ArticleTech Support scam uses LogMeIn
I got a call today from someone whose husband clicked on a tech support scam link, called the phone number, gave them a credit card before she came in and got suspicious. She called me, I said it was a...
View ArticlePenetration Testing on a single computer
Hi all. I am new to Spiceworks and hope someone can help me. I am looking for a tool to do penetration tests on a single computer not the entire network. I need to know what ports are open, patches...
View ArticleSecuring a "new to me" remote site
So not sure where to post this so I ended up here. My company has purchased another company. I have done some preliminary research and am finding some pretty large concerns regarding software licensing...
View ArticleLegal Obligation to Disclose Data Breach to Affected Parties? (UK)
Its is not as bad as the title might suggest: I am currently working on an Incidence Response Plan for my UK based employer and want to make sure we have procedures covered if any incident of data...
View ArticleOne huge burrito, hold the infosec...
This may be my favorite Krebs article of all time for so many reasons. Not the least of which is that Chipotle has no clue as to why sending emails from a domain YOU DO NOT OWN is a bad thing... or...
View ArticleThotcon - Anyone been to it? Worth attending?
Chicago's Thotcon InfoSec conference was recently brought to my attention and, to my surprise, it's been running for a few years and I'd never once heard of it.Has anyone been to this conference? If...
View ArticleMicrosoft Improves Security Practices with a Holistic Approach
Microsoft CEO Satya Nadella gave a keynote speech in Washington, D.C. today about the future of computers and cyber security. He spoke of anew holistic approach that is going to bring about enhanced...
View ArticleUAC Won't Come Out Of Disabled Mode
I have one Windows 8.1 machine that is giving me a headache. I cannot get UAC out of "Disabled" aka: Never Notify mode.I have reset it to the default value and rebooted. This failed. I have checked...
View ArticleNeed help - which product to buy?
Hello,I am trying to find out which product/suite I should go with?Details:3 Windows users on laptopsNeed to encrypt outbound emails and the whole hard drive.I am looking at Symantec Drive Encryption,...
View ArticleRansomware News Roundup November 2015
DecryptorMax 24-hour deadlineRansomware strains use different ways to pressure victims into paying, varying from 7 days after which the ransom doubles, to threatening to publish files on the Internet...
View Articleusage of storage.googleapis.com
Hi there,Just now, someone called me saying his pc reporting a keylogger installed, apparently detected by Internet Defender bearing the Windows logo.The strange thing is, it's coming from one of...
View ArticleSecurity vs. Trust – It’s all about Behavior
I was looking over the definition of secure the other day and found the following entry:v. fix or attach (something) firmly so that it cannot be moved or lostAnd then I applied it to security...
View ArticleStopping the lanmanserver service with FSRM/File Screens
Hello,Among several other layers of security, I have a File Screen setup in FSRM with particular file names to alert me if those file names are written to a shared folder in the event that a ransomware...
View ArticleSecurity and Compliance Issues Expected to Use One-Third of IT Budgets
Some say, "It's not a question IF your network will be breached, the only question is WHEN." (http://yourdailytech.com/2015/11/09/security-and-compliance-issues-expected-to-use-one-third-of-it-b...)
View ArticleInteresting article on LastPass security
http://www.martinvigo.com/even-the-lastpass-will-be-stolen-deal-with-it/Fascinating read even if I don't understand all of it - nothing is perfect and it's encouraging to see the comments on how...
View Article