Here's an interesting read on government employees trying to make an extra buck by serving up pornography on their high school-issued computers. What a lovely story.Don't think this kind of behavior is random. I've seen this very thing at the university level during a security assessment I did early on in my information security consulting venture.You see, one thing I do during my internal security assessments is connect a network ...
Continue Reading...In the whitepaper To Block or Not. Is that the Question?, Palo Alto Networks explores the issue of "Enterprise 2.0" applications such as Facebook, Skype, Twitter and YouTube and how users are now in control of the network. Meanwhile, IT staff is saying "just block it!" and users say "just don't block it!," but it's not that simple. As the whitepaper points out, the real answer lies in your ability ...
Continue Reading...Here are some recent bits I wrote for SearchWinIT.com and SearchExchange.com to help you flesh out the security of your email environment:The state of email content filtering - and what you can doSolidify your Exchange email server incident response plan...
Continue Reading...Check this out. I'm featured in the January 2010 issue of Entrepreneur Magazine's Ask A Pro section where I talk about employee monitoring:Entrepreneur Magazine, January 2010. © 2010 By Entrepreneur Media, Inc. All rights reserved. Reproduced with permission of Entrepreneur Media, Inc.In this piece, it may not be clear whether or not I support monitoring of employee email so let me clarify. I'm not for micromanagement and Big Brother but ...
Continue Reading...Here's some more new information security content - stuff on network administration, employee monitoring, checklist audits, and more. Enjoy!How to get - and keep - user support with security How to get management on board with Web 2.0 security issues Underlying causes of inconsistent patch management Are your IT administrators trustworthy? Monitoring user activity with network analyzersPriorities for your sound regulatory compliance management policy Go beyond a checklist audit for ...
Continue Reading...Researchers at Duke University have found out how to use the basic features of cell phones to determine specific traits of the "space" you're in. Big Brother tracking at its finest. Once mainstream, it'll be at this point when I stop using a cell phone....
Continue Reading...I just stumbled across this "file sharing" site featuring my book Hacking For Dummies...for free download of course. I know, I know, they're not doing anything illegal - they're just providing a way for people to share files. Yeah right. The interesting thing I noted was the "legitimate" companies advertising on the site. WOW...I'm sure the executives at Circuit City would be so proud to know that they're helping sponsor ...
Continue Reading...With all of the technical sophistication we have, apparently business people still haven't figured out a way to automate the employee monitoring function. According to a new Proofpoint/Forrester Consulting survey, 41% of organizations companies with 20,000+ employees are *employing* people to monitor outbound email. Are you serious!? We've had automated employee monitoring systems for 10+ years that anyone in HR can manage and companies are paying people to do this ...
Continue Reading...When I first saw this headline, I thought to myself: Who's the detective that figured this out!? [tongue in cheek]FTP Sites Vulnerable to Data BreachesFTP poses risks?? Uh, yeah! It's just like another technology or host on the network. If it's software, addressable via IP, and has a user login prompt - then, it's undoubtedly going to have holes that are exploited eventually. Especially when network admins and security managers ...
Continue Reading...