• 27 Feb 2008

    RTFM

    At a recent wedding I attended a woman was clamoring about not knowing how to use her digital camera. Apparently no one had shown her how to work it. This reminded me of a basic principle we often overlook in IT and security. It's reading the fine - or freaking or whatever - manual (RTFM).Whenever you have a question or don't know how to use your latest security product, interpret ...

    Continue Reading...
  • 23 Feb 2008

    My security content from this week

    Here's a videocast I recorded recently for SearchWindowsSecurity.com:Securing Endpoints the Right Way...and be sure to check out the details of my first official audio program called Getting Started in Security.For all of my past information security tips and tricks be sure to check out www.principlelogic.com/resources.html....

    Continue Reading...
  • 20 Feb 2008

    My first official audio program – Getting Started in Security – is available!

    Well, it's finally here...My Getting Started in Security audio program is now available for purchase! This audio program (which comes packaged in a 50 minute MP3 file) addresses all the right stuff you need to know to kick off your career in information security. I share with you my practical, helpful, and proven ideas that will help you make better decisions to set yourself up for success in your career ...

    Continue Reading...
  • 19 Feb 2008

    Yet another thing to worry about with laptops

    Apparently more people are being accosted and having their laptops and other mobile devices searched and even taken away from them putting everything on the system at risk. Something drive encryption isn't going to fix! OK, maybe if you have everything stored on an encrypted file/partition. As inconvenient as it is, I'm starting to like the idea of having a clean laptop and only accessing files remotely. I'm just not ...

    Continue Reading...
  • 18 Feb 2008

    Lost laptop worth $54 million?

    Check out this news of Best Buy losing a laptop and, in turn, being sued for $54 million. Apparently there's sensitive information on it...Whew - steep price to pay for a laptop that just needed a new power button. Stakes will probably get higher once the number of people losing sensitive information is disclosed though. Maybe we'll see it on privacyrights.org's list of the finest. $54 million does seem a ...

    Continue Reading...
  • 15 Feb 2008

    My security content from this week

    Here's an article I wrote on security careers and a podcast I recorded this week for SearchWindowsSecurity.com: What's hot in Windows security: Ins and outs of Windows Server 2008 Enjoy! Oh, by the way...I'm almost done with Getting Started in Security - my first official Security On Wheels audio program! It'll be on the securityonwheels.com site very soon. For all of my past information security tips and tricks be sure ...

    Continue Reading...
  • 15 Feb 2008

    Big brother in our homes…also?

    I've always said that Internet filtering in the workplace is fine as long as it's not abused by a rogue network admin or HR manager. Employees are paid to work while at work - not sit around and goof off on the Internet half the day. So, where can you go to get unfiltered and unfettered access to the Internet? Well, apparently you can't rely on your home Internet connection ...

    Continue Reading...
  • 12 Feb 2008

    Yesterday’s BlackBerry outage serves as a reminder …again

    With the foremost messaging system having gone down twice now in less than a year, I'm beginning to wonder if RIM has anyone in their "business continuity" department... I'm guessing other systems/services were affected since this was a wireless disruption but it doesn't matter. A harsh reminder that one of your most critical applications is just a quick third-party outage away...and there's not a whole lot you can do about ...

    Continue Reading...
  • 08 Feb 2008

    My articles from this week

    Here are my information security articles from this week that you may be interested in:Get your SQL Server security goals in orderSecurity tools that limit user logons in WindowsFor all of my past information security tips and tricks be sure to check out www.principlelogic.com/resources.html.Enjoy!...

    Continue Reading...
  • 07 Feb 2008

    Be careful with old/backup files on your Web server

    If you're running an ASP-based site on an IIS server (of course), check for any old or backup .asp files that have been renamed with a .old, .bak, or similar extension. If present, the pages won't be rendered and delivered as the original ASP files would be. Instead, the actual source code is revealed. Not good for business.Oh, this could just as easily happen other platforms. I just had Microsoft ...

    Continue Reading...