With all things being electronic today and us having to manage a hundred different computer accounts between home and work, here's one of those 'haven't thought of before' security issues that can come back and bite hard when the opportunity arises.First, have one set of common passwords you use for business purposes...You know - the account password(s) you use on the network, email, local computer, PGP, your HR portal - ...
Continue Reading...I just received my fancy conference booklet for RSA 2008. If you didn't get one, you'll likely start seeing/hearing more and more buzz leading up to the show that's scheduled for April 7-11 this year.Since RSA's normally in February, I started thinking about this timeline and it hit me. That week happens to be Spring Break for the Atlanta metro area and likely a *lot* of the U.S. What were ...
Continue Reading...They're cheap and easy to use but lots of people don't think about them until it's too late. I'm talking about laptop locks like what the folks at office/computer stores and the folks at PC Guardian sell: They're not 100% foolproof -nothing in security is. But they add an excellent layer of defense in public places, hotel rooms, your own office, and even the trunk of your car beyond what ...
Continue Reading...Don't use Windows Vista....don't buy a new computer with it installed, don't upgrade to it in your enterprise, don't install it on your personal system. Stay FAR FAR away from Windows Vista.Back in December, I forked out way too much $$$ for my dream laptop...The one that had what I needed was HP/Compaq 8510P with all the options. I wanted to go with another brand anyway since I've had lots ...
Continue Reading...No articles published this week. For all of my past information security tips and tricks be sure to check out www.principlelogic.com/resources.html....
Continue Reading..."Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." - Helen KellerAlong the same lines of this week's post on personal security vs. information security....
Continue Reading...Here's my one information security article from this week that you may be interested in:How secure is your SQL Server network design? (from SearchSQLServer.com)For all of my past information security tips and tricks be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...With it being an election year here in the U.S. we're surrounded by all this talk of big promises by power-hungry politicians. This nauseating process made me start to think about the difference between information security and personal security. Let's start with personal security. The politicians say "Elect me and I'll give you the things you need! I'll take someone else's money - by force - and give it to ...
Continue Reading...I don't watch a ton of TV but when I do I often lean towards shows that teach me something (Seinfeld, Reno 911!, and South Park aside). If you haven't see it yet, check out the Discovery Channel show called It Takes a Thief. The premise of the show is home security and how weaknesses can/are exploited by burglars. You'll learn about how to keep your home locked down (lots ...
Continue Reading...I was perusing the latest issue of Security Technology & Design (a trade mag that I write for) and was reminded of some findings of a recent security assessment...It's: where do the bad guys start when attempting to work their way inside a building? Something that's easy to overlook (and often is) is that of unsecured external access to a building. Think about both network type entry points and walk-in ...
Continue Reading...