Ever have a situation where a crisis is going on and you witness people taking advantage of it for their own ill-gotten gains? For example, like a security breach leading to the purchase of unnecessary technical controls or implementation of draconian policies (especially when the basics haven't even been addressed). All to boost an IT manager's ego.Or look at what President Bush did: exploit 9/11 to give the government more ...
Continue Reading...If you can't justify spending $18.99 on the book I co-authored Hacking Wireless Networks For Dummies, then there's an alternative resource for you to at least be able learn about how WEP and WPA can be exploited. In this recent SearchNetworking.com tip, Lisa Phifer has taken the volumes and volumes of technical jabber about the known attacks against WEP and WPA and distilled them into a simple 5 minute read. ...
Continue Reading...Here's an enlightening interview with a tech-savvy lawyer, Chris Wolf, regarding data breach laws. The question posed to Chris is: what would you advise companies when it comes to data breach?In a nutshell, his response is: Get ready in advance.The $64,000 question: Would you tell your corporate lawyer no to this?...
Continue Reading...I just had a flashforward moment a minute ago. I was dragging and dropping a file on my Windows desktop and it "landed" on the Skype window I had open. It didn't do anything because I caught it in time but I thought: Oh no! What if I accidentally transmitted a file to someone in my phonebook? Perhaps someone that didn't need to see that file.But then I thought - ...
Continue Reading...Well, our people in Washington are up to it again. This time a plan for "free" broadband for Americans finally bridge the so-called gap between the Internet haves and have-nots. I thought we already had free Internet access in our local libraries but I guess that's not enough in our couch potato society. Oh, and censorship is already built into the plan - I can't fathom where it'll only go ...
Continue Reading...While you're shopping on Amazon.com, eBay, and elsewhere this fine holiday season, let Mike Rothman's dilemma be a reminder that we all need to take our online passwords seriously. So, keep them strong, keep them unique from one another, keep them to yourself, and (most importantly) keep them in mind. It's that long lost account that can get you....
Continue Reading...Maxell has a new technology that can analyze tape cartridges to determine if they're in good enough condition to use (and rely on) for backups. Pretty neat.Maybe this can help fill the "lack of backup testing" gap pervasive across most businesses. That is if anyone's even paying attention to their backups out there. Apparently they're not....
Continue Reading...Apparently there are lots of SMBs losing lots of important data...all due to lax backup policies and processes. Just look at the crazy stats in this recent post on SearchSMBStorage.com. Backups are about as basic as it gets. Talk about stupid security.It's funny - ask any network admin for his backup policy/procedure documentation and he'll have it to you in a minute flat. Apparently there's still a big disconnect somewhere.Management...where ...
Continue Reading...When out on my lunch break today I drove by the entrance to a manufacturing plant (a Fortune 500 global company) that had a sign that read "Safety is everyone's responsibility".I understand that protecting electronic bits and bytes isn't as critical as protecting human bodies but this sign made me think about information security and where it is on the radar of business leaders. The truth is that unless and ...
Continue Reading...It's the never-ending battle: developers blame the network people for slow performance - and vice versa. I see it all the time and know one wants to take ownership - much less initiative - to fix the problem. Here's a funny post about handing over a network analyzer to developers to help them help themselves....
Continue Reading...