Over the past couple of months I was so focused on writing new content that I've been remiss in posting it online. Here are some tips, thoughts and general opinions around Windows server and workstation security:Desktop backup oversights that can get you into a bindFree open source security tools for finding and fixing Windows flawsMobile security and how you can no longer ignore its impact on enterprise desktop management Why ...
Continue Reading...Here are a few new articles I wrote for TechTarget where I talk about IIS 7.5 security, encrypting Windows Server drives, MBSA vs. commercial vulnerability scanners and the dearly beloved cloud backup services. Enjoy!How vulnerable is Microsoft IIS 7.5 to attacks?Pros and cons of Windows Server drive encryptionWeighing MBSA against paid vulnerability scannersPreventing online backup security threats to your network...
Continue Reading...Disk imaging is one of those awesome technologies that so many businesses can benefit from yet so few people (at least from what I see) are using it. Here's a new piece I wrote for SearchDataBackup.com where I talk about the pros and cons of disk imaging and how you can benefit from it:Using disk imaging software in data backup and recovery...
Continue Reading...Here's a recent podcast I recorded on backup media data destruction...better be sure you're doing it the right way:Ensuring proper data deletion or destruction of backup media...
Continue Reading...Been wondering about the latest on mobile/backup/database/email encryption? Well, here are some recent tips I wrote to TechTarget that'll help you get the ball rolling:Securing SMB laptopsSecuring removable media with BitLocker To GoSecure your data backups with encryption key management best practicesEncryption – the great security control that nobody’s usingThe true value of transparent data encryptionIs full email encryption the solution to Exchange security?...
Continue Reading...Here's my latest information security content. Hope you enjoy!Big IT Lessons Small Businesses Can Learn (an IncTechnlogy.com piece I contributed to)How often should I change the passwords for my bank and other important online accounts? (a Women's Health magazine piece I contributed to)Web 2.0 application security troubleshooting, testing tutorialHIPAA-covered entities, business associates confront HITECH Act rulesTen sure-fire ways to derail your career in IT What you should know about cloud ...
Continue Reading...Here's my latest information security article I wrote for SearchSMBStorage.com you may be interested in:Making sense of regulatory compliance and data storage for SMBs As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more....
Continue Reading...I'm taking this week off but I've scheduled this post of three (more) new articles I've written that you may be interested in:How Windows 7 stands up to security testsUsing an encryption appliance for data backup security (podcast)Data security concerns with online backupAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....
Continue Reading...Here's my latest information security content you may be interested in: Testing rich Internet applications for security holes The pros and cons of host-based vs. appliance-based tape encryption As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....
Continue Reading...Here's my latest information security content for your perusal.For starters, here's an article I wrote for Security Technology Executive magazine:Social Engineering: The big risk no one's thinking aboutHere's an article I re-published for a local Atlanta site called TechLINKs:How's your information security culture?Here's a bit I wrote for SearchDataBackup.com:Data security concerns with online backup...and here's a podcast I recorded for SearchCompliance.com:The future of compliance policy managementAs always, be sure to ...
Continue Reading...