• 06 Dec 2011

    School staff members and porn – Why you should care

    Here's an interesting read on government employees trying to make an extra buck by serving up pornography on their high school-issued computers. What a lovely story.Don't think this kind of behavior is random. I've seen this very thing at the university level during a security assessment I did early on in my information security consulting venture.You see, one thing I do during my internal security assessments is connect a network ...

    Continue Reading...
  • 04 Oct 2011

    Should You Ban Facebook at the Office?

    In the whitepaper To Block or Not. Is that the Question?, Palo Alto Networks explores the issue of "Enterprise 2.0" applications such as Facebook, Skype, Twitter and YouTube and how users are now in control of the network. Meanwhile, IT staff is saying "just block it!" and users say "just don't block it!," but it's not that simple. As the whitepaper points out, the real answer lies in your ability ...

    Continue Reading...
  • 22 Mar 2010

    Email security – using content filtering and incident response to round things out

    Here are some recent bits I wrote for SearchWinIT.com and SearchExchange.com to help you flesh out the security of your email environment:The state of email content filtering - and what you can doSolidify your Exchange email server incident response plan...

    Continue Reading...
  • 15 Jan 2010

    I’m featured in the new issue of Entrepreneur Magazine

    Check this out. I'm featured in the January 2010 issue of Entrepreneur Magazine's Ask A Pro section where I talk about employee monitoring:Entrepreneur Magazine, January 2010. © 2010 By Entrepreneur Media, Inc. All rights reserved. Reproduced with permission of Entrepreneur Media, Inc.In this piece, it may not be clear whether or not I support monitoring of employee email so let me clarify. I'm not for micromanagement and Big Brother but ...

    Continue Reading...
  • 04 Jan 2010

    My latest security content

    Here's some more new information security content - stuff on network administration, employee monitoring, checklist audits, and more. Enjoy!How to get - and keep - user support with security How to get management on board with Web 2.0 security issues Underlying causes of inconsistent patch management Are your IT administrators trustworthy? Monitoring user activity with network analyzersPriorities for your sound regulatory compliance management policy Go beyond a checklist audit for ...

    Continue Reading...
  • 02 Oct 2009

    This is really cool and really scary

    Researchers at Duke University have found out how to use the basic features of cell phones to determine specific traits of the "space" you're in. Big Brother tracking at its finest. Once mainstream, it'll be at this point when I stop using a cell phone....

    Continue Reading...
  • 21 Jul 2008

    What’s wrong with this picture…Circuit City?

    I just stumbled across this "file sharing" site featuring my book Hacking For Dummies...for free download of course. I know, I know, they're not doing anything illegal - they're just providing a way for people to share files. Yeah right. The interesting thing I noted was the "legitimate" companies advertising on the site. WOW...I'm sure the executives at Circuit City would be so proud to know that they're helping sponsor ...

    Continue Reading...
  • 20 May 2008

    Manually monitoring email? What’s up with that!?

    With all of the technical sophistication we have, apparently business people still haven't figured out a way to automate the employee monitoring function. According to a new Proofpoint/Forrester Consulting survey, 41% of organizations companies with 20,000+ employees are *employing* people to monitor outbound email. Are you serious!? We've had automated employee monitoring systems for 10+ years that anyone in HR can manage and companies are paying people to do this ...

    Continue Reading...
  • 02 Apr 2008

    FTP bad for sensitive information…and lives?

    When I first saw this headline, I thought to myself: Who's the detective that figured this out!? [tongue in cheek]FTP Sites Vulnerable to Data BreachesFTP poses risks?? Uh, yeah! It's just like another technology or host on the network. If it's software, addressable via IP, and has a user login prompt - then, it's undoubtedly going to have holes that are exploited eventually. Especially when network admins and security managers ...

    Continue Reading...