• 16 Jul 2009

    Another ridiculous way of handling Web passwords

    I use iContact's marketing service. It's an overall great app and reputable company but they've now made my list of ridiculous password requirements. I was logging in to their site today using what I consider to be a strong password and got this message:As part of our latest application security upgrade, iContact has strengthened the criteria for account passwords. To access your account, you must first reset your password.So I ...

    Continue Reading...
  • 15 Jul 2009

    One of the best infosec books ever written

    I had the opportunity and pleasure to do the technical editing on this book by my friend and colleague Becky Herold:The Shortcut Guide to Understanding Data Protection from Four Critical PerspectivesThis book is hands-down one of the best books out there on information security and why it matters to the business. Becky doesn't simply regurgitate the same old stuff either (not that I would expect her to). She has many ...

    Continue Reading...
  • 15 Jul 2009

    UPS sloppiness – How’s this for document security?

    I just went into a bathroom behind a UPS delivery guy. He left both his handheld computer and someone's overnight package sitting on the sink counter while he went into a stall. Anyone could've walked out with both and he'd never know who did it...This helps explain how packages go missing and subsequent breach notifications ensue.Gives you the warm fuzzies about using UPS to ship sensitive documents, huh!?...

    Continue Reading...
  • 10 Jul 2009

    Google’s delusional, for now

    I'm still out but read about Google taking on Microsoft in the paper and had to comment on it. So Chrome is now going to be a full-fledged OS taking on Windows 7. So they think they can take on Microsoft in the OS business!? Ha. I'm not going to hold my breath. Maybe once they get in bed with the hardware vendors and started forcing Chrome on buyers of ...

    Continue Reading...
  • 09 Jul 2009

    My latest security content

    I'm taking this week off but I've scheduled this post of three (more) new articles I've written that you may be interested in:How Windows 7 stands up to security testsUsing an encryption appliance for data backup security (podcast)Data security concerns with online backupAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 07 Jul 2009

    My latest security content

    I'm taking this week off but I've scheduled this post of three new articles I've written that you may be interested in:Networking to enhance your IT careerA compliance officer, secure network aren't enough for real complianceData retention policies and procedures for SMBsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 04 Jul 2009

    What are you celebrating today?

    For those of you in the U.S., Happy 4th of July! Proudly wearing my "Bill of Rights" shirt. I think my next purchase from one of my favorite stores, CafePress.com, is going to be this button:Kudos to the men and women who have fought for our freedom and independence to this point - cheers to all of you out there who still believe in it....

    Continue Reading...
  • 01 Jul 2009

    The definitive secret to success in your job and career

    It all comes down to this. I couldn't agree more."Eighty-five percent of the reason you get a job, keep that job, and move ahead in that job has to do with your people skills and people knowledge." - Cavett Robert...

    Continue Reading...
  • 30 Jun 2009

    Tool to take the pain out of threat modeling

    Can you tell I'm getting caught up on talking about some neat security tools worth checking out!? Well, here's another one: Amenaza's SecurITree that I first wrote about in my book Hacking For Dummies, 2nd edition. It's a decision support tool you can use to analyze specific threats to your business and the likelihood of attack. Threat modeling is something that many people do in their head "qualitatively" (or not ...

    Continue Reading...
  • 29 Jun 2009

    Great way to maintain desktop security & integrity

    If you're looking for a way to keep your Windows desktops locked down, safe from abuse, and clean reboot after reboot, check out Faronics Deep Freeze. It can save you a ton of time and headache......

    Continue Reading...