Tech Support For Dummies

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 25 October 2011

Your title really means nothing

Posted on 05:13 by Unknown
I can't tell you how many times I've met people over the years who have a fancy title like CEO or Director of This and That and it ended up being more of a façade than anything. As John Maxwell talks about in this video, your title really means nothing.

I've often told people, I don't care what you call me as long as you pay me what I'm worth. That helps keep me on track to ensure I maximize my value to the marketplace.

Even labels after your name such as CISSP, CCIE, CTO and Esquire mean nothing in the grand scheme of things. Just because you've earned these letters doesn't mean you're suddenly an expert in the field or, for that matter, someone that people actually respect and enjoy working with. Instead it's the value you bring to the table. Work by this mantra and you'll reap rewards you never imagined.
Read More
Posted in careers, certifications, degrees, personal responsibility, security leadership, thinking long term | No comments

Friday, 21 October 2011

Users making security decisions is your Achilles' heel

Posted on 04:56 by Unknown
I recently came across some content in a book outlining the benefits of SSL. The author depicted a scenario where SSL is in place to help the user authenticate the server/site he's connecting to and if a certificate-related error popped up in the browser then the user would know that the site was malicious and (presumably) not continue on with the connection. This very situation is an example of how we assume/presume/hope that users are always paying attention and will do the right things with security.

What do you think would happen with the average user in this situation? I'm confident that most people would simply think nothing of it, click past any pop-up warnings and continue about their business. Why? Well, that's what people do. And that's the very problem with have with information security today.

No doubt, we have to be able to balance security with convenience and usability but the moment we allow users to make security decisions - especially ones that could involve phishing and related malware attacks - we open our networks up to complete compromise. This goes along with something I've been saying recently: Your network is only one click away from compromise™ [my new trademark ;-)].

Training, technology - you name it, nothing is 100% certain other than the fact that you have this risk in your business this very moment; guaranteed. I'm not convinced we're going to be able to get past this.
Read More
Posted in personal responsibility, scary stuff, security awareness, ssl, stupid security, user awareness | No comments

Tuesday, 18 October 2011

Keynoting the NKU 2011 Security Symposium next week

Posted on 04:39 by Unknown
If you happen to be in the Cincinnati, OH area next Friday, October 28th, I'd love it if you could join me as I give the keynote presentation for the Northern Kentucky University 2011 Security Symposium. I'll be talking about mobile security problems and solutions and it looks like they've lined up tons of great content and speakers.

Hope to see you there!
Read More
Posted in Kevin's keynotes, message from Kevin, presentations | No comments

Monday, 17 October 2011

Dan Wheldon's crash a harsh reminder

Posted on 05:15 by Unknown
IndyCar lost a great driver yesterday. When I first heard of Dan Wheldon's crash and death I couldn't believe it. I'm a big IndyCar fan and felt like I knew him - especially with the commentary he has been providing on Versus' coverage of IndyCar this year.

Driving a race car myself - albeit at a *much* different level - I can't help but question the risks of what I do. Seeing these types of incidents rattles me to the core. It's certainly easy to say: Well, Dan knew the risks every time he got into his car...maybe, but it doesn't make it any better nor will it bring back the driver, husband and father we lost yesterday.

I'm letting this incident serve as a reminder of just how fragile life can be and how important it is to spend quantity time with the ones I love. Something most of us probably need to work on.

Rest in peace Dan and God bless you and your family.
Read More
Posted in message from Kevin | No comments

Tuesday, 11 October 2011

What can you really say about your network?

Posted on 07:23 by Unknown
Here's a new guest blog post I wrote for AlgoSec (a Roswell, Georgia-based company with some really solid firewall management applications) where I talk about something near and dear to all of us in IT:

Do you really understand your network?


...it's more than just a sappy relationship. :-)

By the way, in case you missed it, I wrote a whitepaper for AlgoSec recently that you may be interested in as well:

Firewall Management: 5 Challenges Every Company Must Address

Enjoy.
Read More
Posted in change management, compliance, firewalls, Kevin's security content, network complexities, network security, security management, visibility, whitepapers | No comments

Thursday, 6 October 2011

My latest bits on Windows 7, Microsoft SCM and Metasploit

Posted on 02:59 by Unknown
Here are some new pieces I've written for my friends at TechTarget on Windows security that you may be interested in including bits on the often overlooked but oh so valuable Security Compliance Manager and Metasploit:

Using Windows 7 management tools to your advantage

Getting to know Security Compliance Manager

Why aren’t you using Metasploit to expose Windows vulnerabilities?


You know the deal, be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in compliance, cool products, Kevin's security content, metasploit, security management, security testing tools, Windows 7, windows security | No comments

Wednesday, 5 October 2011

Join me at the CDW - TechTarget seminar in Phoenix next week

Posted on 07:27 by Unknown
If you happen to be in or around Phoenix, AZ next Thursday October 13th, I'd love it if you could join me at the TechTarget / CDW seminar: Predictive Security: Plan Ahead to Stay Ahead of the Next Threat.

I'll be giving the keynote and combined breakout session in addition to the sessions provided by other vendor experts. We'll close out with a lively Q&A that I know you'll enjoy.

If you can't make the Phoenix event, I'll be in Philly and New York next month so perhaps our paths will cross in one of those cities.

For what it's worth, here's a sampling of audience feedback on my keynote and breakout sessions from our Boston event two weeks ago and our Dallas event that took place in August:
  • Kevin was great - perspective with lots of practical suggestions.
  • Perfect speaker, enjoyable to listen to.
  • Awakening presentation.
  • Great speaker, very knowledgeable.
  • Left me thinking.
  • Great job! Very enjoyable.
  • Excellent insight and perspective
  • Outstanding Presentation
  • Good lead into sessions for participants
  • Insightful view of foundation related tasks for security
  • Set the stage and energy level right
  • Kevin is a good speaker
  • Really good relevant quotes and analogies
Hope to see you soon!
Read More
Posted in careers, Kevin's keynotes, Kevin's seminars, message from Kevin, testimonials | No comments

Information security's bond with e-discovery is strengthening

Posted on 06:52 by Unknown
We're seeing more and more how information security and e-discovery go hand in hand. Here are two new pieces I've written that delve into the subject. I hope you enjoy.

Information security’s tie-in with the e-discovery process


Lax enterprise mobile device management hampers e-discovery

As always, be sure to check out www.principlelogic.com/resources.html for links to all of my information security whitepapers, podcasts, webcasts, books and more.
Read More
Posted in compliance, e-discovery, forensics, government regulations, Kevin's security content, mobile security, security management | No comments

Tuesday, 4 October 2011

Should You Ban Facebook at the Office?

Posted on 08:33 by Unknown
In the whitepaper To Block or Not. Is that the Question?, Palo Alto Networks explores the issue of "Enterprise 2.0" applications such as Facebook, Skype, Twitter and YouTube and how users are now in control of the network. Meanwhile, IT staff is saying "just block it!" and users say "just don't block it!," but it's not that simple. As the whitepaper points out, the real answer lies in your ability to see what's actually going on on the network and then decide on the best fit for your organization.

An interesting bit from the whitepaper is that 69% of respondents to a McKinsey study say their companies have gained measurable business benefits, including more innovative productsand services, more effective marketing, better access to knowledge, lower cost of doing business and higher revenues because of Enterprise 2.0 software (while IT staffers argue the opposite: that these applications DON'T boost the bottom line). Knowing that most traditional security controls will block their software, developers of Enterprise 2.0 applications look for ways to circumvent the system so that employees and other users can get access anyway (necessity is the mother of invention, right?).

For governance to work, IT should play a big part in the definition of policies, but not be the sole owner of those policies (something I've been ranting about for years because policy creation and enforcement is an HR, legal and management issue — not an IT issue). I have a client that's experiencing this very dilemma with social media right now. Company managers want to provide Facebook access for their employees. However, recent malware outbreaks have compromised several company systems and placed its network at risk. They have policies and antivirus software, but not anti-spyware protection which would have (presumably) blocked the
infections. We're now working on a plan for moving forward to keep users happy and minimize business risks at the same time.

These new applications are presenting a Catch-22 that's throwing many small and medium-sized businesses for a loop. There are no good answers right now. If you take anything from this, just know you have to do your homework and understand the risks/benefits. Blocking or no blocking, the angles to this issue are still being worked out — one business at a time. Stayed tuned and, in the meantime, stay vigilant.
Read More
Posted in employee monitoring, malware, policy enforcement, security policies, social media | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How you can get developers on board with security starting today
    Some people - including a brilliant colleague of mine - think security is not the job of software developers . In the grand scheme of things...
  • NetScan Tools LE - a must-have for investigators
    Have you ever had a need to run a program and get a relatively small amount of data just to do your job but end up getting caught in the com...
  • "Top Blogs" list & some home security considerations
    I think I may have found the first sign that my blog is growing and gaining some traction. I've made it to the Top 20 Home Security Blog...
  • Wooo...HIPAA audits are coming & the irony of KPMG's involvement
    I've always believed that compliance is a threat to business [hence why I help businesses take the pain out of compliance by addressing ...
  • Great tool for seeking out sensitive info on your network
    One of the greatest risks in business today is the issue of unstructured information scattered about the network waiting to be misused and ...
  • It's hard being human
    Cavett Robert once said something about character that resonates within information security - especially regarding ongoing management and l...
  • Dario Franchitti and I
    As many of you know I'm a motorsports nut -both as a driver and a fan. This provided the influence for my Security On Wheels logo. Well,...
  • The value of partial code scanning, now
    Check out my new piece on the business value of partial code scanning where I outline why it's better to start your source code analysi...
  • Be it in healthcare or infosec, the short term is for losers
    With all the doctor & hospital visits I've gone (and am still going) through with family members in the past few years, I've com...
  • Live from #RSAC: Cloud computing's got some kinks (but you knew that)
    I'm attending the RSA Conference this week and just sat through a panel discussion on cross-jurisdictional issues in the cloud. It was p...

Categories

  • active directory
  • application firewalls
  • APTs
  • aslr
  • atm security
  • audio programs
  • audit logging
  • automated scanner oversights
  • back to basics
  • backups
  • big brother
  • bitlocker
  • budget
  • business case for security
  • business continuity
  • BYOD
  • car hacking
  • careers
  • certifications
  • change management
  • checklist audits
  • cissp
  • clear wireless
  • cloud computing
  • communication
  • compliance
  • computer glitch
  • conferences
  • consulting
  • content filtering
  • cool products
  • cool sites
  • cross-site request forgery
  • cross-site scripting
  • csrf
  • customer no service
  • cybersecurity bill
  • data at rest
  • data breach laws
  • data breaches
  • data centers
  • data destruction
  • data leakage
  • data protection
  • data retention
  • database security
  • degrees
  • desktop management
  • disaster recovery
  • disk imaging
  • disposal
  • dns
  • document security
  • domino
  • DoS attacks
  • drive encryption
  • e-discovery
  • ediscovery
  • employee monitoring
  • encrypting data in transit
  • encryption
  • end point security
  • ethical hacking
  • exchange
  • experience
  • expert witness
  • exploits
  • facebook
  • FERPA
  • file integrity monitoring
  • firewalls
  • forensics
  • full disk encryption
  • global warming
  • goal setting
  • good blogs
  • government intrusion
  • government regulations
  • great quotes
  • hacking
  • hardware
  • hipaa
  • hitech
  • hitech act
  • home security
  • humor
  • identity access management
  • identity theft
  • IIS
  • incident response
  • information classification
  • information security quotes
  • intel
  • intellectual property
  • internal threat
  • java
  • Kevin's books
  • Kevin's interviews
  • Kevin's keynotes
  • kevin's panels
  • kevin's quotes
  • Kevin's security content
  • Kevin's seminars
  • Kevin's videos
  • laptop encryption
  • laptop security
  • legal
  • Linux
  • locking screens
  • low-hanging fruit
  • malware
  • marketing hype
  • message from Kevin
  • messaging security
  • metasploit
  • metrics
  • mobile apps
  • mobile security
  • motivation
  • multi-factor authentication
  • network analysis
  • network complexities
  • network protocols
  • network security
  • networking essentials
  • Novell
  • office
  • online backup
  • online safety
  • open source security
  • owasp
  • p2p
  • passwords
  • patch management
  • patching
  • pci 6.6
  • pci dss
  • PCNAA
  • penetration testing
  • people problems
  • personal responsibility
  • phishing
  • physical security
  • pii
  • podcasts
  • policy enforcement
  • politics
  • presentations
  • privacy
  • quality assurance
  • recommended books
  • recommended magazines
  • recycling
  • remote access security
  • ridiculous password requirements
  • risk analysis
  • risk management
  • rogue insiders
  • ROI
  • RSA 2012
  • running a business
  • saas
  • salary
  • scary stuff
  • sccm
  • sdlc
  • security assessments
  • security audits
  • security awareness
  • security committees
  • security leadership
  • security management
  • security operations
  • security policies
  • security policy
  • security scans
  • security standards
  • security statistics
  • security technologies
  • security testing tools
  • security tools
  • selling security
  • sharepoint
  • small business
  • smartphone security
  • SMBs
  • social media
  • software development
  • source code
  • source code analysis
  • special offer
  • SQL injection
  • sql server
  • ssl
  • storage security
  • student information systems
  • stupid security
  • success
  • telecommuting
  • testimonials
  • thinking long term
  • third-party applications
  • threat modeling
  • time management
  • training
  • twitter
  • uncool products
  • unstructured information
  • unstructured infromation
  • user awareness
  • vendors
  • virtual machine security
  • visibility
  • voip
  • vulnerability assessments
  • web 2.0
  • web application security
  • web browser security
  • web server security
  • webcasts
  • WebInspect
  • whitelisting
  • whitepapers
  • Windows
  • Windows 7
  • windows 8
  • windows 8.1
  • Windows Mobile
  • windows security
  • Windows Vista
  • wireless
  • wireless security
  • zero tolerance

Blog Archive

  • ►  2013 (35)
    • ►  November (3)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (4)
    • ►  April (4)
    • ►  March (4)
    • ►  February (5)
    • ►  January (5)
  • ►  2012 (77)
    • ►  December (2)
    • ►  November (2)
    • ►  October (4)
    • ►  September (3)
    • ►  August (3)
    • ►  July (4)
    • ►  June (5)
    • ►  May (9)
    • ►  April (5)
    • ►  March (10)
    • ►  February (14)
    • ►  January (16)
  • ▼  2011 (163)
    • ►  December (15)
    • ►  November (11)
    • ▼  October (9)
      • Your title really means nothing
      • Users making security decisions is your Achilles' ...
      • Keynoting the NKU 2011 Security Symposium next week
      • Dan Wheldon's crash a harsh reminder
      • What can you really say about your network?
      • My latest bits on Windows 7, Microsoft SCM and Met...
      • Join me at the CDW - TechTarget seminar in Phoenix...
      • Information security's bond with e-discovery is st...
      • Should You Ban Facebook at the Office?
    • ►  September (16)
    • ►  August (13)
    • ►  July (8)
    • ►  June (13)
    • ►  May (18)
    • ►  April (16)
    • ►  March (13)
    • ►  February (13)
    • ►  January (18)
  • ►  2010 (170)
    • ►  December (10)
    • ►  November (14)
    • ►  October (7)
    • ►  September (27)
    • ►  August (20)
    • ►  July (8)
    • ►  June (15)
    • ►  May (4)
    • ►  April (23)
    • ►  March (21)
    • ►  February (11)
    • ►  January (10)
  • ►  2009 (55)
    • ►  December (5)
    • ►  November (10)
    • ►  October (21)
    • ►  September (19)
Powered by Blogger.

About Me

Unknown
View my complete profile