Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 20 November 2009

I need your help *today* Friday Nov 20th

Posted on 05:33 by Unknown
You may already be aware of TechTarget's IT Knowledge Exchange. It's a great place to ask questions and/or establish yourself as an expert.

Anyway, I just realized that today's the last day to nominate another member [subliminal message]Kevin Beaver
[/subliminal message] for their Panasonic 42" TV giveaway. Someone you know [subliminal message]Kevin Beaver[/subliminal message] is in the running and could really use your help.

So what's in it for you? When you nominate someone
[subliminal message]Kevin Beaver[/subliminal message], you get a chance to win one of five $20 Amazon gift cards they're giving away. Hardly anyone has voted so your odds of winning are really good! And, by signing up you can become part of a good community of folks - good for networking, good for your career.

Thanks!
Read More
Posted in cool sites, message from Kevin | No comments

"Computer glitch" always to blame for someone's bad choices

Posted on 04:58 by Unknown
Here's my two cents on the people failure - I mean "computer glitch" - at Atlanta's Hartsfield airport yesterday. Gotta blame something...

Hartsfield outage: "Computer glitch" or FAA "people failure"?
Read More
Posted in business continuity, computer glitch, personal responsibility, stupid security | No comments

Thursday, 19 November 2009

I could've sworn we had this thing called HIPAA

Posted on 09:27 by Unknown
Remember way back in April of 2005 when the HIPAA Security Rule went into effect? Well apparently some healthcare providers didn't get the memo. Big blow to Health Net.

So, no reasonable security controls to meet the HIPAA requirements much less no encryption of mobile storage devices? Seriously people: what is it going to take to encrypt mobile drives!!??

I'm not a fan of BitLocker in the enterprise and not sure how big Health Net is but, heck, they could've at least considered it!

Golly...I think I get so fired up about this stuff because it affects us all so personally. Furthermore it's, um, common knowledge that big security breaches will and do occur on a daily basis.
Read More
Posted in drive encryption, hipaa, mobile security, stupid security | No comments

Monday, 16 November 2009

So, certification is what's best for your career, huh?

Posted on 08:58 by Unknown
Per Microsoft Learning's director: "We see the trend increasing that individuals are making the decision that what is best for their careers is to be certified"...Completely disagree. Read the news column...Can you see the hidden message?

Here's what's best for your information security career...substance, not certification. Ooh, maybe I should trademark that. ;-)
Read More
Posted in careers, certifications, goal setting | No comments

BitLocker and Windows 7 – Things you need to consider

Posted on 06:36 by Unknown
I was recently asked to write a whitepaper on considerations for Bitlocker in Windows 7. While doing my initial research I learned a lot about BitLocker and discovered some new ideas and approaches for managing sensitive data. In this whitepaper I cover:
  • Why data encryption matters
  • BitLocker’s new features in Windows 7
  • Operational concerns you need to think about
  • Usability issues that can create problems
  • Potential compliance and security gaps you don’t want to overlook
…and more.

We know the security threats we’re up against. We understand the value of data encryption. And odds are Windows 7 is going to be the next big operating system at the desktop. Taking these things into consideration, we’ve got a long way to go in order to get our arms around protecting sensitive data – especially on mobile devices such as laptops, netbooks, and external drives.

Knowing how the marketing beast tries to pull us in one direction and seemingly critical technical issues in the other, we often overlook which way is best for the business. After all, that’s what security decisions need to be based on. You have to look at your business operations, politics, staff expertise and so on with a critical eye and ask yourself what’s going to be the best data encryption solution overall.

I’m a big advocate of using what you’ve got before you go out and spend even more money on third-party security products to gain the control and visibility you need. I see it all the time. Managers complain that security’s too difficult or expensive all the while they’re not even using their built-in operating system controls – controls that can go a long way towards keeping things in check. But just because something is built in and “free” doesn’t mean it’s the best fit or suitable for the business.

I’ve come to the conclusion that many businesses – arguably the majority – are not anywhere close to being where they need to be with security and especially data encryption at the workstation. Microsoft isn’t necessarily coming to the rescue with BitLocker in Windows 7 either.

Some good old-fashioned research and planning is in order if you’re going to get your arms around data encryption and truly minimize your business risks in this compliance-driven world we work in. This means understanding the facts and thinking long term about how your decisions on emerging technologies will impact your business both now and down the road. My whitepaper Considerations for BitLocker in Microsoft Windows 7 will help you get the ball rolling.
Read More
Posted in bitlocker, compliance, drive encryption, laptop encryption, mobile security, Windows 7 | No comments

Wednesday, 11 November 2009

Responsibility becoming a thing of the past?

Posted on 07:44 by Unknown
Here's a great post from Neal Boortz regarding holding people responsible for their choices. It's very simple to blame something inanimate instead of fixing the real problems. Like blaming malware for security breaches...

Practically everything in life and business can be traced back to choice - that's why we have to use it wisely.
Read More
Posted in personal responsibility, security leadership | No comments

Tuesday, 10 November 2009

M-W's Word of the Day very fitting

Posted on 13:12 by Unknown
I subscribe to Merriam-Webster's "Word of the Day" and saw today's word is rectify. Here's the example sentence they used:

"The night before the Web site was to go live, the programmers worked frantically to rectify several unresolved security problems."

Too funny! ...and sadly, all too common. Hey, at least they were working to fix the security issues before it went live! ;-)
Read More
Posted in information security quotes, stupid security, web application security | No comments

Monday, 9 November 2009

Have you thought about business continuity metrics?

Posted on 06:55 by Unknown
Either way, here's a good set of business continuity metrics worth checking out. Something that's sorely missing from many plans...that is, where plans even exist.
Read More
Posted in business continuity, disaster recovery | No comments

Sunday, 8 November 2009

The real deal with the SSL/TLS flaw

Posted on 10:36 by Unknown
Over the past few days Twitter, security blogs, and news columns have been going crazy with the newly-discovered SSL/TLS flaw. Man, you'd think it's the next WEP exploit discovery. The security sky is falling...we must retreat.

Seriously, is this thing a big deal? Not in my opinion - at least not in all but 99.9% of any given situation. But what do I know? I'm just the security guy that sees network shares sharing out entire drives full of sensitive files, firewalls with default configurations and no passwords, smartphones without a trace of security enabled, laptops with supposedly "nothing of value" that end up having thousands PII records yet no semblance of drive encryption, database servers without passwords, physical security cameras and data center control systems with default passwords that anyone on the network can mess around, operating systems missing critical patches that are easily-exploited using free tools, Web sites/apps with gobs of XSS and weak authentication controls, and on and on and on and on.

If you want to pick nits and chase the rabbit down the infinite path of limited return, sure, it's a big deal. Otherwise, chances are you've much bigger issues on your hands.
Read More
Posted in back to basics, data at rest, encrypting data in transit, low-hanging fruit, ssl, stupid security | No comments

Tuesday, 3 November 2009

Good dictionary to use for password cracking

Posted on 07:37 by Unknown
Here's a pretty comprehensive password dictionary I recently came across that you may want to use in your security testing...there may be "friendlier" download link but I haven't searched for it.

If time is a factor, this dictionary may be too big for its own good given the time it'd take to run through everything but at least you know you're using a good dictionary. After all, your dictionary-based password cracking results are a direct reflection of the quality of your dictionary. Happy cracking!
Read More
Posted in cool products, passwords, penetration testing, security testing tools | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ►  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ►  October (9)
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ▼  2009 (55)
    • ►  December (5)
    • ▼  November (10)
      • I need your help *today* Friday Nov 20th
      • "Computer glitch" always to blame for someone's ba...
      • I could've sworn we had this thing called HIPAA
      • So, certification is what's best for your career, ...
      • BitLocker and Windows 7 – Things you need to consider
      • Responsibility becoming a thing of the past?
      • M-W's Word of the Day very fitting
      • Have you thought about business continuity metrics?
      • The real deal with the SSL/TLS flaw
      • Good dictionary to use for password cracking
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile