Mimecast - it's not me, it's you ...
We've been a customer of Mimecast for a few years. They've been very effective for spam filtering. However I've often found their support to be lacking. For e.g. a few times I've called and the person...
View ArticleI need an IT General Controls Audit. Which vendors can you recommend?
I have two vendors that I've worked with in the past, but would like to change to new ones. We are supposed to switch them out every other year or so, and it's about time we start looking elsewhere. If...
View ArticleHow will cybersecurity change after the Paris attacks?
Each week, we run a feature (written by yours truly) called 'This Week in Getting Hacked', where we discuss the week's top cybersecurity news.This week, we took a look at how the UK is stepping up...
View ArticleAmazon enables 2FA, so what's holding up everyone else?
Amazon is yet the latest in a number of companies that have 2 Factor Authentication available to further secure users' accounts. Very late to the party but at least they have it as an option now....
View ArticleCompany Passwords
Our company has a few different departments (Web, PR, Advertising and so on) each department have their own website passwords for various external websites.As head of I.T I would like to take control...
View ArticleThe Importance of Two Factor Authentication in Information Security
Ask anyone how their systems, mobile computers, networks and applications are protected and it is highly likely that the answer that you will get is “via passwords.” Ask them again if they feel...
View ArticleWhat is the best password manager?
I am looking for a suitable Password manager, for use by the IT Team only (4 members). Currently we use a spreadsheet, with all the passwords recorded on it.It is to cover secure passwords, for...
View ArticleVon Von's Facebook word cloud generator
is it safe???? I see everyone of my friends doing this.it is a third party site you visit and then log into to Facebook through, that right there throws a red flag for me. I also cannot find any...
View ArticleWindows Terminal Server - Two Factor Authentication
Just wondering if any of you guys can recommend a two factor authentication setup for Windows Terminal Server 2008?Google throws up Duo Security. Anyone have any recent experience of them? As per...
View ArticleSOC-2 compliance crucial for keeping data safe in the cloud
A guest post by our very own CEO on SOC-2 compliance.Do you know how many cloud services your organization uses? According to Forrester Research, the average organization uses66 differentcloud service...
View ArticleWin-Pak SE Release.1 IC Controller Panel Initialization error!
We are using Win-Pak SE Release.1 with 3 each PRO-2200 IC Controller Panel.Recently we are having error during Panel Initialization with one of the three IC Controller Panel.The other two panels are...
View ArticleSoftware monitoring tool for activity of the computers
Hello !I want to find a software that monitors computer activity ..when the computers startup or shut down within a network. It would be ideal if the report would automatically send to e-mail with the...
View Articlewindows default permissions on folder
so we had a customer's website was exploited with malware, probably playx and files written to the following folder. %AllUsersProfile%\Application Data\Microsoft\DeviceSync\By default, this folder has...
View ArticleCloud-based password managers. Who wins?
KeePass aside, seeing that it is emphasized to be a solution for offline, I want to hear from the community about cloud-based password solutions that you all have tried. I know a lot of people get up...
View Article[INFOGRAPHIC] The Top 5 Holiday Scams To Warn Your Users About
You can find the full infographic at the KnowBe4 blog, and if you save it off you can print it full size to print. It's...
View ArticleMail Security for Exchange as Second layer Protection
Hi,I use Spam Titan to protect incoming/outgoing emails for my company.But for better security i need an additional mail security for MS Exchange to scan Information Store.Until now i had Mail...
View ArticleTop UK firms urged to get a cyber ‘health check’
https://www.gov.uk/government/news/top-uk-firms-urged-to-get-a-cyber-health-check"Government urges the UK’s 350 largest businesses to take part in free 'health check to help them understand and improve...
View ArticleWho needs hackers when the data is just being given away? Georgia sends out CDs
“[I]n October, a clerical error in the IT Division led to these discs containing personal identifying information that should not have been included. The IT person responsible has been terminated for...
View ArticleTop IT Security Headlines this Week!
The hackers responsible for the 2013 attacks on South Korea are believed to be back at it. Meanwhile, a security company has discovered two tools that may have been used to bypass security in the Sony...
View Article