Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 23 December 2009

My latest security content (finally!)

Posted on 10:20 by Unknown
I can't believe it's been this long! I've been so busy writing and haven't made the time to post my links. No excuses. Anyway, here's my latest information security content - some good stuff on politics and careers that can help you get off to a nice start in 2010.

Networking with the bigwigs to gain support for IT

Dos and don'ts when serving on an IT committee

Five things you need to know about politics in IT

Much, much more to come...Enjoy!

In the meantime, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, Twitter updates, and more.
Read More
Posted in careers, Kevin's security content, networking essentials, politics | No comments

Thursday, 17 December 2009

"Top Blogs" list & some home security considerations

Posted on 05:20 by Unknown
I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Bloggers list. Many thanks to Adrienne Carlson for this. There are some other interesting blogs on her list so check it out.

Speaking of home security here's something to consider while home with your family over the holidays. Many believe we have a "right" to self defense and that the police will be there when we need them. In fact, when seconds count the police are only minutes away. I think deep down most people know this.

Our courts have ruled we have no right to police protection and time and again 911 centers around the country prove that we are, by and large, on our own when seconds count - like what happened in this recent incident in Atlanta.

Don't get me wrong. I'm 100% behind law enforcement officers - I've worked in the field and have friends and family in it as well. But like teachers in government schools, it's not the individuals, it's the system. Our government at work. Make your own decisions and stay safe!
Read More
Posted in home security, personal responsibility, physical security, stupid security | No comments

Wednesday, 16 December 2009

How Tiger Woods' marriage is like risk management

Posted on 13:23 by Unknown
In the seemingly unavoidable media drone tirades hammering Tiger Woods and his marital situation I realized the tie-ins that such high-profile marriages have with what we do in the information security field. It boils down to two things:
  1. It's all about the money
  2. The focus going in is on who can get the most out of it - "what's in it for me?"
We see this all the time when it comes to information security - executives, legal counsel, and CFOs flexing their muscles pushing back on security initiatives until they're gone for good. I worked on a project where this very thing happened and it ultimately led to tens of thousands of computers being "0wned" by the bad guys. Funny how some people assume that heads buried in sand is a good risk mitigation strategy.

Sadly so many people go into marriage this way. It's all about the contracts, the lawyers, and the selfishness. Meanwhile the very essence of marriage is ignored. Obviously not a viable long-term strategy for marriage or information security...but people will continue on in their same old ways and thus the cycle will continue on.
Read More
Posted in business case for security, risk analysis, stupid security | No comments

Thursday, 3 December 2009

Another file/folder security option

Posted on 04:39 by Unknown
One of the biggest vulnerabilities I come across in my security assessments is sensitive information scattered about unprotected drives/shares. Solutions to this dilemma include locating/classifying different information types, locking down shares and file permissions, and encrypting information on mobile devices. If the latter option interests you there's a new company I stumbled across called New Softwares.net that sells very reasonably-priced software that can help. I haven't tried it out yet but it's worth a look-see.
Read More
Posted in cool products, drive encryption, laptop encryption, mobile security | No comments

Tuesday, 1 December 2009

Funny thing about notices of privacy practices

Posted on 10:37 by Unknown
I just received a "notice of insurance information practices" from my health insurance provider that says something to the effect of:
"ALL INFORMATION CONFIDENTIAL. We're required by law to keep your information confidential. It will be seen only by our employees and authorized business associates."

Really? Pretty gutsy statement from any business but especially one who's already been listed on the Chronology of Data Breaches.
Read More
Posted in data breach laws, hipaa, hitech act, stupid security | No comments

Friday, 20 November 2009

I need your help *today* Friday Nov 20th

Posted on 05:33 by Unknown
You may already be aware of TechTarget's IT Knowledge Exchange. It's a great place to ask questions and/or establish yourself as an expert.

Anyway, I just realized that today's the last day to nominate another member [subliminal message]Kevin Beaver
[/subliminal message] for their Panasonic 42" TV giveaway. Someone you know [subliminal message]Kevin Beaver[/subliminal message] is in the running and could really use your help.

So what's in it for you? When you nominate someone
[subliminal message]Kevin Beaver[/subliminal message], you get a chance to win one of five $20 Amazon gift cards they're giving away. Hardly anyone has voted so your odds of winning are really good! And, by signing up you can become part of a good community of folks - good for networking, good for your career.

Thanks!
Read More
Posted in cool sites, message from Kevin | No comments

"Computer glitch" always to blame for someone's bad choices

Posted on 04:58 by Unknown
Here's my two cents on the people failure - I mean "computer glitch" - at Atlanta's Hartsfield airport yesterday. Gotta blame something...

Hartsfield outage: "Computer glitch" or FAA "people failure"?
Read More
Posted in business continuity, computer glitch, personal responsibility, stupid security | No comments

Thursday, 19 November 2009

I could've sworn we had this thing called HIPAA

Posted on 09:27 by Unknown
Remember way back in April of 2005 when the HIPAA Security Rule went into effect? Well apparently some healthcare providers didn't get the memo. Big blow to Health Net.

So, no reasonable security controls to meet the HIPAA requirements much less no encryption of mobile storage devices? Seriously people: what is it going to take to encrypt mobile drives!!??

I'm not a fan of BitLocker in the enterprise and not sure how big Health Net is but, heck, they could've at least considered it!

Golly...I think I get so fired up about this stuff because it affects us all so personally. Furthermore it's, um, common knowledge that big security breaches will and do occur on a daily basis.
Read More
Posted in drive encryption, hipaa, mobile security, stupid security | No comments

Monday, 16 November 2009

So, certification is what's best for your career, huh?

Posted on 08:58 by Unknown
Per Microsoft Learning's director: "We see the trend increasing that individuals are making the decision that what is best for their careers is to be certified"...Completely disagree. Read the news column...Can you see the hidden message?

Here's what's best for your information security career...substance, not certification. Ooh, maybe I should trademark that. ;-)
Read More
Posted in careers, certifications, goal setting | No comments

BitLocker and Windows 7 – Things you need to consider

Posted on 06:36 by Unknown
I was recently asked to write a whitepaper on considerations for Bitlocker in Windows 7. While doing my initial research I learned a lot about BitLocker and discovered some new ideas and approaches for managing sensitive data. In this whitepaper I cover:
  • Why data encryption matters
  • BitLocker’s new features in Windows 7
  • Operational concerns you need to think about
  • Usability issues that can create problems
  • Potential compliance and security gaps you don’t want to overlook
…and more.

We know the security threats we’re up against. We understand the value of data encryption. And odds are Windows 7 is going to be the next big operating system at the desktop. Taking these things into consideration, we’ve got a long way to go in order to get our arms around protecting sensitive data – especially on mobile devices such as laptops, netbooks, and external drives.

Knowing how the marketing beast tries to pull us in one direction and seemingly critical technical issues in the other, we often overlook which way is best for the business. After all, that’s what security decisions need to be based on. You have to look at your business operations, politics, staff expertise and so on with a critical eye and ask yourself what’s going to be the best data encryption solution overall.

I’m a big advocate of using what you’ve got before you go out and spend even more money on third-party security products to gain the control and visibility you need. I see it all the time. Managers complain that security’s too difficult or expensive all the while they’re not even using their built-in operating system controls – controls that can go a long way towards keeping things in check. But just because something is built in and “free” doesn’t mean it’s the best fit or suitable for the business.

I’ve come to the conclusion that many businesses – arguably the majority – are not anywhere close to being where they need to be with security and especially data encryption at the workstation. Microsoft isn’t necessarily coming to the rescue with BitLocker in Windows 7 either.

Some good old-fashioned research and planning is in order if you’re going to get your arms around data encryption and truly minimize your business risks in this compliance-driven world we work in. This means understanding the facts and thinking long term about how your decisions on emerging technologies will impact your business both now and down the road. My whitepaper Considerations for BitLocker in Microsoft Windows 7 will help you get the ball rolling.
Read More
Posted in bitlocker, compliance, drive encryption, laptop encryption, mobile security, Windows 7 | No comments

Wednesday, 11 November 2009

Responsibility becoming a thing of the past?

Posted on 07:44 by Unknown
Here's a great post from Neal Boortz regarding holding people responsible for their choices. It's very simple to blame something inanimate instead of fixing the real problems. Like blaming malware for security breaches...

Practically everything in life and business can be traced back to choice - that's why we have to use it wisely.
Read More
Posted in personal responsibility, security leadership | No comments

Tuesday, 10 November 2009

M-W's Word of the Day very fitting

Posted on 13:12 by Unknown
I subscribe to Merriam-Webster's "Word of the Day" and saw today's word is rectify. Here's the example sentence they used:

"The night before the Web site was to go live, the programmers worked frantically to rectify several unresolved security problems."

Too funny! ...and sadly, all too common. Hey, at least they were working to fix the security issues before it went live! ;-)
Read More
Posted in information security quotes, stupid security, web application security | No comments

Monday, 9 November 2009

Have you thought about business continuity metrics?

Posted on 06:55 by Unknown
Either way, here's a good set of business continuity metrics worth checking out. Something that's sorely missing from many plans...that is, where plans even exist.
Read More
Posted in business continuity, disaster recovery | No comments

Sunday, 8 November 2009

The real deal with the SSL/TLS flaw

Posted on 10:36 by Unknown
Over the past few days Twitter, security blogs, and news columns have been going crazy with the newly-discovered SSL/TLS flaw. Man, you'd think it's the next WEP exploit discovery. The security sky is falling...we must retreat.

Seriously, is this thing a big deal? Not in my opinion - at least not in all but 99.9% of any given situation. But what do I know? I'm just the security guy that sees network shares sharing out entire drives full of sensitive files, firewalls with default configurations and no passwords, smartphones without a trace of security enabled, laptops with supposedly "nothing of value" that end up having thousands PII records yet no semblance of drive encryption, database servers without passwords, physical security cameras and data center control systems with default passwords that anyone on the network can mess around, operating systems missing critical patches that are easily-exploited using free tools, Web sites/apps with gobs of XSS and weak authentication controls, and on and on and on and on.

If you want to pick nits and chase the rabbit down the infinite path of limited return, sure, it's a big deal. Otherwise, chances are you've much bigger issues on your hands.
Read More
Posted in back to basics, data at rest, encrypting data in transit, low-hanging fruit, ssl, stupid security | No comments

Tuesday, 3 November 2009

Good dictionary to use for password cracking

Posted on 07:37 by Unknown
Here's a pretty comprehensive password dictionary I recently came across that you may want to use in your security testing...there may be "friendlier" download link but I haven't searched for it.

If time is a factor, this dictionary may be too big for its own good given the time it'd take to run through everything but at least you know you're using a good dictionary. After all, your dictionary-based password cracking results are a direct reflection of the quality of your dictionary. Happy cracking!
Read More
Posted in cool products, passwords, penetration testing, security testing tools | No comments

Friday, 30 October 2009

1 day left for 50% discount on current audio programs

Posted on 12:21 by Unknown
Final call for the 50% discount on my current Security On Wheels audio programs. Just enter OCT09 as the discount code when checking out!
Read More
Posted in audio programs, message from Kevin | No comments

You'd think Twitter would have the means to fix this

Posted on 02:51 by Unknown


















Seems like I get it more often than not these days...Ahh, the growing pains of an Internet startup.
Read More
Posted in business continuity, twitter | No comments

Thursday, 29 October 2009

Disaster recovery is dead?? Not hardly!

Posted on 07:48 by Unknown
In this recent SearchCIO.com bit, the executive director of the Disaster Recovery Institute International says that disaster recovery is dead. He goes on to say that "disaster recovery (DR) and business continuity have become synonymous" and (here's the kicker) "We don't do recovery anymore, because what everybody wants is continuous operations...We have auto failover now. We have redundancy in data. We do have more continuity. And that is because recovery is almost impossible..."

Really!? Where is he seeing this? Maybe in the largest of large corporations? Perhaps government agencies with unlimited budgets or maybe it's some Utopian society where every business can justify to have every control in place necessary to keep the business running at whatever cost?

That's not what I'm seeing...That's not reality. Amazing how people see what they want to see and nothing more.

Read More
Posted in business continuity, disaster recovery, stupid security | No comments

Wednesday, 21 October 2009

Metasploit as we knew it going bye bye?

Posted on 06:09 by Unknown
The day I never thought I'd see has come. Once HD Moore announced "Metasploit is hiring" I knew something was going on. Metasploit has been acquired by Rapid7...huh!? Too bad Qualys - maker of my favorite OS/network vulnerability scanner - missed this opportunity!

According to the Rapid7 acquisition FAQ Metasploit will remain open source but with a commercial twist. I hope it only gets better...fingers crossed.

Hey at least Capitalism prevailed...it's dying slowly but surely in this country but I'm glad to see this kind of stuff is still happening. Kudos to HD Moore and company!!
Read More
Posted in cool products, metasploit, open source security, security testing tools | No comments

Friday, 16 October 2009

Email business continuity - this is funny...and ironic

Posted on 04:49 by Unknown
As I reported a couple of days ago, my email security provider stopped working. Maybe they took a hiatus...a sabbatical...an extended vacation - and didn't tell me. Seriously, I did end up calling them a few times trying to work things out. I got what seemed to be a knowledgeable tech rep trying to help me. The problem was he never could. He said he'd call me back two different times. He made several promises to get "development" involved so they could release my 2, no 3, days worth of emails stuck in their queue. Care to guess the outcome?

No emails recovered. No call back. I'm stuck on my own. The tech rep said they were sent. I never received them...That's a tough one prove but the fact of the matter is that I lost over 100 emails. Odds are only 10-15 were legitimate emails that matter to my business, but that's not the point. The very thing I've depended on for business continuity in the event my email server or Internet connection was down - their email queue - ended up creating a business continuity problem for me. I wanted to give them the benefit of the doubt. No such luck.

The vendor is St. Bernard. Their service is iPrism. I've had a "free" account with them since the Singlefin days back in 2003. Another case of you get what you pay for?

The funny thing is that Google is apparently having similar email delivery problems of their own. Postini had an outage and people went 20 hours without email....woooo, big deal! How about several days worth like I experienced? The ironic thing is that I'm considering moving to Postini. Who would've thought...

I'm telling you folks, you have to be careful hopping on this "cloud computing" bandwagon...as in St. Bernard's case and apparently in Google's case as well (with Postini and the recent Gmail outages), these "SaaS" providers don't always have our best interests in mind. Free service or not, customer no-service is always an option so you'd better plan for it advance.
Read More
Posted in customer no service, uncool products, vendors | No comments

Wednesday, 14 October 2009

The fastest vendor acquisition I've seen

Posted on 11:43 by Unknown
This has to be the fastest security startup/acquisition I've ever seen. I'm pretty sure the company - which is here in my neck of the woods - was less than a year old.

You know how I feel about SaaS and "the cloud" but kudos to Paul Judge, Chris Tilton, and those guys for growing and turning this thing around so quickly. Capitalism at its finest!!
Read More
Posted in cloud computing, saas, vendors | No comments

Cloud computing & customer no-service - match made in heaven?

Posted on 04:20 by Unknown
I never thought I could be so productive. This week I've had less pressure to deliver. I've been able to turn "things" off. All while I'm attending a conference when I usually get even more behind. Well you see, my email isn't working. My email security "application service provider", I mean "managed service", dang it, actually my "cloud computing" provider delivering "software as a service" has apparently decided to take a break from things. I haven't received but 1 or 2 emails in the past two days...I normally get 75+ per day. It's actually been a nice break - especially from all the spam. But it's not what I was looking for.

This outage is actually nothing new with my provider...It's actually an ongoing issue I've had over the years. But the problem usually corrects itself within a few hours. Not this time. So I emailed the company last night using a personal email account and actually got a quick response. Impressive. I thought we were going to be able to have a dialog but apparently their support team decided that leaving for the day was more important. I've followed up with them twice since then...nothing. No response. But I'm going to give them the benefit of the doubt and not mention any names. It's probably something simple. Likely something stupid on my part - I am the "dumb customer" after all.

Side note: I know I can set my MX record to point directly to my email server and get my email back running again...or I could choose another provider. The problem is that I have over a day's worth of emails stuck in my email security provider's queue - likely several days worth since this problem started over a week ago. So I can't give up hope on them just yet...I have to get my emails out.

I'm telling you this story because you have a big, no grand, responsibility to make good IT and information security choices for your business. Buyer beware with cloud computing. Know that just because some cloud computing provider promises the moon that you're actually going to get the service you need. They don't know your business. They don't understand your needs. Cloud computing providers are in business to make money, not coddle you with loving support and bend over backwards to get you up and running. I know, I know, there are lots of good cloud computing providers out there...but how do you know who they are? You usually won't until you find out the hard way...as I am now. Just because your lawyers and their lawyers agreed upon certain terms in a contract doesn't mean some yahoo in tech support is going to care when the time comes.

I'm a one-man shop...imagine if this was a problem someone was having in a large corporation. Someone's rear end would be in a sling right now. His or her job on the line. Speaking of cloud computing gone wrong, was your business affected by the Sidekick debacle? Maybe you're already looking for work because of that...

Don't lose sight of the fact that security and managing information risks is about control and visibility. If you don't have those because of some customer no-service situation then no matter how "cool" cloud computing is at the moment this hype over substance the marketers are pushing is probably not worth the risk.

Enough said, I've got to get back to work and fix this...
Read More
Posted in business continuity, cloud computing, customer no service, stupid security | No comments

Tuesday, 13 October 2009

In case you're trying to email me...

Posted on 14:00 by Unknown
...my lovely email security provider has chosen to work part-time apparently. If you need to reach me, email my full name (1 word) at gmail dot com.
Read More
Posted in message from Kevin | No comments

Latest version of LANguard worth considering

Posted on 07:45 by Unknown
Have you seen the new - OK, it's not that new any more - version of LANguard (formerly LANguard Network Security Scanner)? It's certainly a tool worth checking out if you do vulnerability scanning.

I've been using LANguard for years for share finding and authenticated scanning and it does both very well. The biggest change in the latest version is the user interface. I've never been a big fan and I'm still not, but I'm getting used to it. Many of the improvements in the latest version involve authenticated scans. The quick-view dashboard is a nice improvement and I really like the scan progress.

When performing untrusted/unauthenticated scans I've found that LANguard won't find nearly the number of vulnerabilities than QualysGuard especially with regards to missing patch vulns that are exploitable via Metasploit. Hopefully that'll continue to evolve. But it does a very good job with this during authenticated scans (as would be expected if you have login credentials).

I'm still waiting for the ability to test your authentication credentials like what Sunbelt Network Security Inspector offers - at least used to, haven't used it lately. You have to plug in your credentials and hope that your login works. It'd also be nice to be able to sort through the network share finder results and filter based on permissions found (i.e. shares where Everyone has full access).

Here's a screenshot of the main interface:


In the interest of getting you hooked on good tools, here's a link to GFI's free version of LANguard. Hope this helps!
Read More
Posted in cool products, security scans, security testing tools, vulnerability assessments | No comments

Proper password length

Posted on 07:09 by Unknown
Probably late to the game but just had to post this:

During a recent password audit, it was found that a blonde was using the following password:

MickeyMinniePlutoHueyLouieDeweyDonaldGoofy

When asked why such a big password, she said that it had to be at least 8 characters long.
Read More
Posted in humor, information security quotes, passwords | No comments

Monday, 12 October 2009

Cool tool for cracking/resetting SQL Server passwords

Posted on 10:47 by Unknown
Elcomsoft has a neat - and relatively new - tool called Advanced SQL Password Recovery I thought you may be able to benefit from. It can be used to change any SQL Server databases protected by a password included SQL Server 2000, 2005 and 2008. All you need is access to the master.mdf file. SQL Server optional.

I was going to show a screenshot but there's not that much to show...you load the program, you point it to the master.mdf file and it'll crack the passwords - simple as that. Very cool.

Yet another reason to keep your Windows systems patched and your share/file permissions in check.
Read More
Posted in cool products, database security, passwords, security testing tools, sql server | No comments

Friday, 9 October 2009

My latest security content

Posted on 04:41 by Unknown
Here are a couple of new articles of mind that were just published. Many more to come. Enjoy!

Balancing Windows security with reasonable password policies

Storage encryption essentials

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, Twitter updates, and more.
Read More
Posted in active directory, drive encryption, Kevin's security content, passwords, security policies, storage security, Windows | No comments

Thursday, 8 October 2009

Asking the right questions

Posted on 09:16 by Unknown
One of the elements of being successful in security is asking the right questions - and not being afraid to do so. As information security professionals we can, and should, question the funding of security projects, management being on board with the business risks at hand, and so on.

I recently came across two great quotes regarding questioning. First, Anthony Robbins said "Quality questions create a quality life. Successful people ask better questions, and as a result, they get better answers." Second, Albert Einstein said "The important thing is to not stop questioning."

We don't have to be pests and we certainly need to be careful and not do more harm than good when getting people on our side. But if you approach your security initiatives with enough finesse and confidence and show how you're concerned about the business your questioning might be just what the doctor ordered.
Read More
Posted in careers, communication, great quotes, information security quotes, security leadership, security management | No comments

Tuesday, 6 October 2009

Don't give up

Posted on 09:31 by Unknown
Napoleon Hill once said "The majority of men meet with failure because (they don't create) new plans to take the place of those that fail."

I see this a lot: people with big plans who are met with a setback, they get discouraged, and give up. If you feel strongly about doing something - writing a book, changing careers, getting a degree, whatever - don't be this person.
Read More
Posted in careers, goal setting, motivation, security leadership, thinking long term | No comments

Good info on hardening Windows XP

Posted on 09:19 by Unknown
I've written various articles on hardening Windows XP over the years and am always seeking out new nuggets since XP's going to be around a while. Eric Shultze has a neat list of 5 registry keys you can use to further harden your Windows XP systems that you may not have heard about. Enjoy!
Read More
Posted in Windows, windows security | No comments

10 Ways to Become Indispensable at Work

Posted on 05:39 by Unknown
Here's a good piece on keeping your job and growing your career:

10 Ways to Become Indispensable at Work

I'd also add network to build your relationships, focus on your communications skills, and always, always - put things in terms of the business - what's in it for them. Here are some IT and security career tips (that can apply to anyone) I've written that dive into these areas and more.
Read More
Posted in careers, communication, security leadership | No comments

Monday, 5 October 2009

National Archives does it again!

Posted on 12:24 by Unknown
You may recall my appearance on CNN television earlier this year when a hard drive went missing from the National Archives and Records Administration. Well, apparently some lessons don't sink in. This time around the National Archives folks sent an unsecured hard drive containing personal info on 70 million+ veterans to a vendor for "repair and recycling" (huh?). Apparently an employee subverted a policy then had to go on leave and one thing led to another...Interesting story - I'm not surprised at the outcome.

In the spirit of our current govern-by-reaction mentality in Washington maybe a few new laws can be passed to keep this from happening. Oh wait, it's the government failing to listen to itself in the first place. Unbelievable.
Read More
Posted in compliance, government regulations, laptop encryption, laptop security, mobile security, stupid security | No comments

My latest security content

Posted on 02:00 by Unknown
Here's my latest information security content. Enjoy!

Are you earning what you're worth in information security?

Understanding the politics of information security

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, Twitter updates, and more.
Read More
Posted in careers, Kevin's security content, politics, security leadership | No comments

Friday, 2 October 2009

This is really cool and really scary

Posted on 13:29 by Unknown
Researchers at Duke University have found out how to use the basic features of cell phones to determine specific traits of the "space" you're in. Big Brother tracking at its finest. Once mainstream, it'll be at this point when I stop using a cell phone.
Read More
Posted in content filtering, cool products, employee monitoring, scary stuff | No comments

The deal with my Security On Wheels audio programs

Posted on 08:31 by Unknown
If you've been following me for any length of time you've probably noticed that development of my Security On Wheels audio programs has slowed way down. Let me explain why.

In a nutshell, I'm practicing what I preach: "focus on your highest payoff tasks". With this economic mess we're in I've had to really buckle down and focus on billable work this year to keep my momentum up and ride out this storm. Existing sales are good but I'm striking a balance between time/costs associated with developing and producing new content with the reality that so many people aren't buying much right now. Being self-employed I don't have a choice. That said I will return! I'm putting together my next audio program now.

Mega thanks to those of you who've provided such positive feedback on my existing audio programs. It confirms that I indeed have a good thing going here.

If you're not currently on my Security On Wheels mailing list and wish to be notified of new audio programs and special offers you can sign up on the home page at securityonwheels.com.

If you're interested in trying out either of my existing audio programs, I'm offering a 50% discount on any purchase to get you on board...and get you hooked. Just enter OCT09 as the discount code when checking out. It's good through the end of October.

Thanks for your patience and stay tuned for great new things with Security On Wheels in the near future.

All the best,
Kevin
Read More
Posted in audio programs, Kevin's security content, message from Kevin | No comments

Great quote to help motivate you

Posted on 08:24 by Unknown
I just came across a great quote by "The Donald" (Trump) that contains a great little nugget to inspire us to do the best we can in our careers:

"As long as you're going to be thinking anyway, think big."

Practice this over and over and you'll eventually become what you think about. Sure, small and large annoyances will get in your way (like my rants here and on my Twitter page) but just get them out of your system and move on to bigger and better things. Let the joke be on someone else.
Read More
Posted in careers, great quotes, information security quotes, motivation, security leadership | No comments

Wednesday, 30 September 2009

My latest security content

Posted on 04:52 by Unknown
Here's my latest information security content...many more to come soon! Hope these prove to be of value to you.

Finding cross-site scripting (XSS) application flaws checklist

The Windows Report - Analyzing the IT Job Market (podcast)

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in careers, cross-site scripting, Kevin's security content, web application security, web browser security | No comments

Tuesday, 29 September 2009

XSS in my article on XSS!?

Posted on 09:02 by Unknown
I "tweeted" about this but I had to post it here as well. I just realized that my new article for SearchSoftwareQuality.com on XSS actually executes JavaScript when loading because of some sample code I inserted into it!! It's not actual XSS but looks like it! Ahh the irony.

Finding cross-site scripting (XSS) application flaws checklist


BTW, I'm working on getting it resolved...
Read More
Posted in cross-site scripting, web 2.0, web application security | No comments

Know of anyone who is "ignorant of the facts"?

Posted on 05:26 by Unknown
British prime minister Benjamin Disraeli once said "To be conscious that you are ignorant of the facts is a great step to knowledge."

What a great quote related to information security...in the context of both users and management. There are people out there who understand the basics of information security risks. It's all the other people you need to focus on. Here's how you can build credibility and get others on your side with information security.
Read More
Posted in great quotes, information security quotes, security leadership, security management, selling security | No comments

Thursday, 24 September 2009

Do you have racy photos on Twitter too?

Posted on 09:27 by Unknown
If you're on Twitter you may want to check out your followers - at least their pictures...I'm getting a lot of people with racy photos. Maybe I'm just developing a new fan base of people who feel really comfortable around me! ;-)

And to think that I could have a few hundred more followers on Twitter if I didn't filter out the junk!
Read More
Posted in twitter | No comments

Wednesday, 23 September 2009

Quoted in today's WSJ

Posted on 10:13 by Unknown
If you can, check out today's Wall Street Journal - page A20. I talk about sensitive information being mismanaged on mobile devices. You may already know how I feel about mobile security...what's it going to take to fix this issue?
Read More
Posted in compliance, kevin's quotes, mobile security, stupid security, unstructured infromation | No comments

Monday, 21 September 2009

My latest security content

Posted on 14:43 by Unknown
Here are a few new pieces just published. Enjoy!

The lowdown on PCI compliance

Testing rich Internet applications: 2009's best free tools


Big Brother or lowly minion - finding your role in IT

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in careers, compliance, pci 6.6, pci dss, security management, security testing tools, web 2.0 | No comments

Swimming in Atlanta

Posted on 10:01 by Unknown
We're getting completely drenched here in the South. Pouring rain nonstop for four days and it's not supposed to let up for another few days. Must be all that "global warming". Seriously we've been hearing about reduced sun spot activity as of late (just not so much in the mainstream media because that would go against their religion). Some scientists (likely the ones whose jobs aren't tied to taxpayer funding) believe sunspot activity affects weather here on earth...like the really cold weather we've been having over the past couple of years...and all this rain.

I've always thought that it's quite cocky of man to believe he's powerful enough to change the climate but this guy has beat me to the punch. Some food for thought. That said "man changing the climate" is not what "global warming" is about anyway. But you already knew that.

Anyway, lots of homes and buildings flooded here in my neck of the woods should remind us all that business continuity - even if you work from home - is not something to take lightly. Have a great week, stay dry, and wish us luck!
Read More
Posted in business continuity, global warming | No comments

Friday, 18 September 2009

4 things you can do right now to find out if your business is at risk

Posted on 08:24 by Unknown
Here's a link to a post I just made that you may be interested in:
4 things you can do right now to find out if your business is at risk
Read More
Posted in compliance, security assessments, small business | No comments

Reader's choice on best security products

Posted on 05:36 by Unknown
In case you're looking around, here's a good overview of security products that our peers like.
Read More
Posted in cool products, security tools | No comments

Wednesday, 16 September 2009

My latest security content

Posted on 13:09 by Unknown
Here's my latest information security content. Hope you enjoy!

Big IT Lessons Small Businesses Can Learn (an IncTechnlogy.com piece I contributed to)

How often should I change the passwords for my bank and other important online accounts? (a Women's Health magazine piece I contributed to)

Web 2.0 application security troubleshooting, testing tutorial

HIPAA-covered entities, business associates confront HITECH Act rules

Ten sure-fire ways to derail your career in IT

What you should know about cloud backup security (a podcast Q&A)

Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in backups, careers, cloud computing, compliance, government regulations, hipaa, hitech act, online backup, online safety, passwords, small business, web 2.0, web application security | No comments

Third-party apps still a big security issue

Posted on 09:54 by Unknown
A while back I wrote about the importance of patching third-party software on your enterprise desktops. Apparently third-party applications are still out of the security loop. It's a seemingly small problem but it can have pretty big consequences.
Read More
Posted in change management, patch management, security management, stupid security, third-party applications | No comments

Parental software, is this where we're headed!?

Posted on 09:43 by Unknown
Be careful which parental monitoring software you install on your kids' computers. Looks like some people think their content filtering software is a means to capture the text of IM chats for the purposes of marketing intelligence. Sickening.

Good reason to use a network analyzer to see what's being sent out of your computers/networks! Get an executive or IT admin on one of these computers talking about sensitive subjects and its (unsuspected) data leakage at its finest.
Read More
Posted in content filtering, network analysis, privacy, uncool products | No comments

Have you seen this movie yet?

Posted on 08:01 by Unknown
I took a couple of days off to celebrate the completion of my freshly-updated book Hacking For Dummies, 3rd edition. More on this to come...Anyway, during this time off I went to see the movie District 9 that was most excellent. One of the best flicks I've ever seen. Extremely creative with good acting too! You have to see it while it's still in theaters!!
Read More
Posted in message from Kevin | No comments

Monday, 14 September 2009

Boston Beer a big let down

Posted on 04:13 by Unknown
I heard a Samuel Adams beer commercial on the radio this morning that reminded me of the big let down I had from them recently. I was at a speaking engagement on physical / data center security on behalf of Anixter in Boston (pronounced Bahstun for those of you here in the South with me) and wanted to see some of the sights while I was there.

Being a fan of Sam Adams I hopped (like the pun?) onto their Web site to get tour information. Wasn't there. Seriously....I called their sales # and was told they don't handle tour information there. I was transferred to the "tour guy". No answer - had to leave a message. I kindly asked that he return my call with the basics. Never heard back.

Now, remember, I just wanted basic tour information (where, when, how much). Hey Jim Koch, you're obviously proud of your beer, how hard does it have to be to get tour information??? What a let down...

Now I have a negative association every time I hear a Sam Adams commercial or see Sam Adams beer in the store. Hey at least there's a handful of microbrew alternatives like Flying Dog. And, go figure, they actually have tour information on their Web site. Took me all of 4 seconds to find it. Next time I'm in Maryland maybe I'll pay them a visit.

Anyway, just had to get that off my chest.

Hope you have an excellent week...back in touch soon.
Read More
Posted in customer no service, data centers, Kevin's seminars, physical security | No comments

Wednesday, 9 September 2009

Loving BitLocker so far...

Posted on 12:38 by Unknown
I recently wrote about Windows BitLocker's false sense of security and I've made it loud and clear that I'm a big advocate of encrypting mobile drives. Well, since I had to reload my laptop recently I decided to take the plunge into Windows 7 la la land and, at the same time, decided to try out BitLocker rather than reload PGP whole disk encryption. I don't know if I'm missing something but, golly, I sure do like it so far....It's seamless. I especially enjoy how it handles removable storage devices so conveniently. [fingers crossed]
Read More
Posted in bitlocker, laptop encryption, laptop security, mobile security | No comments

Tuesday, 8 September 2009

Why Most PowerPoint Presentations Suck

Posted on 02:02 by Unknown
That got your attention, huh? Mine too when I first came across this gem of a book by Rick Altman. It's pretty much all you need to know about what to do - and just as importantly, what not to do - with Microsoft PowerPoint. It has a no nonsense approach to making your presentations better. Mandatory reading for all college students, perhaps??




By the way, Rick Altman is bringing his show to Atlanta in October (the 11th through the 14th). For those of you here in my neck of the woods, Rick is graciously offering a two for one registration here. I'm really looking forward to it and hope to see you there!
Read More
Posted in careers, conferences, presentations, recommended books | No comments

Friday, 4 September 2009

My latest security content

Posted on 10:37 by Unknown
My goodness - it's been over a month since I've posted my latest security content...I've been so busy writing the stuff that posting the links has gotten put on the back burner. Good problem to have! Anyway, here's my latest:

Networking to enhance your IT career

Toeing the company line – is it good or bad for your IT career?

Security and compliance can go together, when done in the right order

Making sense of regulatory compliance and data storage for SMBs

Run encryption the right way to ensure wireless network security

Free Windows security tools every admin must have

Nine common password oversights to avoid

Secure your Windows systems with proper password practices

Secure Windows XP before a Windows 7 upgrade

Essentials of static source code analysis for Web applications

Secure data destruction options for old backup tapes and disk (a piece I contributed to)

Whew...I think that's it for now!

As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more.
Read More
Posted in careers, compliance, data retention, encrypting data in transit, Kevin's security content, networking essentials, passwords, source code analysis, storage security, Windows, wireless security | No comments

Good info on balancing life and work

Posted on 10:04 by Unknown
It's something I work on every day - trying to balance my personal priorities with my work priorities. Being an entrepreneur and a capitalist often conflicts with the responsibilities I have at home. But I've found that it can be done if you choose to do so. Here's a good bit on balancing life and work to get you rolling. Enjoy...and have a nice, long, relaxing weekend!
Read More
Posted in success | No comments

Wednesday, 2 September 2009

Interesting flaw in Sears' Web site all too common

Posted on 10:47 by Unknown
Check out this bit about a security flaw recently revealed on Sears' Web site. As the researcher alluded to, hacking and security are way more than people exploiting known software flaws. There are so many other security issues with Web applications. I see it all the time when doing my manual analyses on Web sites/applications. The sky is the limit for these business logic vulnerabilities and I suspect it'll always be that way. I love being a consultant who performs Web security assessments - there's always something new and challenging!
Read More
Posted in security testing tools, vulnerability assessments, web application security | No comments
Newer Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ▼  2009 (55)
    • ▼  December (5)
      • My latest security content (finally!)
      • "Top Blogs" list & some home security considerations
      • How Tiger Woods' marriage is like risk management
      • Another file/folder security option
      • Funny thing about notices of privacy practices
    • ►  November (10)
      • I need your help *today* Friday Nov 20th
      • "Computer glitch" always to blame for someone's ba...
      • I could've sworn we had this thing called HIPAA
      • So, certification is what's best for your career, ...
      • BitLocker and Windows 7 – Things you need to consider
      • Responsibility becoming a thing of the past?
      • M-W's Word of the Day very fitting
      • Have you thought about business continuity metrics?
      • The real deal with the SSL/TLS flaw
      • Good dictionary to use for password cracking
    • ►  October (21)
      • 1 day left for 50% discount on current audio programs
      • You'd think Twitter would have the means to fix this
      • Disaster recovery is dead?? Not hardly!
      • Metasploit as we knew it going bye bye?
      • Email business continuity - this is funny...and ir...
      • The fastest vendor acquisition I've seen
      • Cloud computing & customer no-service - match made...
      • In case you're trying to email me...
      • Latest version of LANguard worth considering
      • Proper password length
      • Cool tool for cracking/resetting SQL Server passwords
      • My latest security content
      • Asking the right questions
      • Don't give up
      • Good info on hardening Windows XP
      • 10 Ways to Become Indispensable at Work
      • National Archives does it again!
      • My latest security content
      • This is really cool and really scary
      • The deal with my Security On Wheels audio programs
      • Great quote to help motivate you
    • ►  September (19)
      • My latest security content
      • XSS in my article on XSS!?
      • Know of anyone who is "ignorant of the facts"?
      • Do you have racy photos on Twitter too?
      • Quoted in today's WSJ
      • My latest security content
      • Swimming in Atlanta
      • 4 things you can do right now to find out if your ...
      • Reader's choice on best security products
      • My latest security content
      • Third-party apps still a big security issue
      • Parental software, is this where we're headed!?
      • Have you seen this movie yet?
      • Boston Beer a big let down
      • Loving BitLocker so far...
      • Why Most PowerPoint Presentations Suck
      • My latest security content
      • Good info on balancing life and work
      • Interesting flaw in Sears' Web site all too common
Powered by Blogger.

About Me

Unknown
View my complete profile