Category Archives: Guest blog

5 Best Practices for Patch Management – Business Edition

Sysadmins for small and medium sized businesses don’t have the time or the staff to spend weeks working out policies and procedures for patching… they need to get in, get it done, and get on with the other five jobs

Helpful Tips to Cure your PC from Malware

Malicious ware (a.k.a malware) For someone who have used computer for a long time, it is impossible not to experience a virus attack in between that period. Similar to other viruses, computer viruses has a way of spreading throughout the

RFS: Request For Security!

Rick Lawhorn, CISA, CISSP, CHP, CHSS As the industry prepares for increased regulations and compliance requirements from state and federal governments, businesses are taking a harder look at endpoint security. This emerging trend is starting to require businesses to re-evaluate

Cars may need Anti-Malware protection as well…

The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars  (http://www.autosec.org/pubs/cars-usenixsec2011.pdf). The researchers found that, among other things, an attacker could disable the

5 Ways Event Log Management Makes You More Secure

While there are a ton of great reasons for you to implement event log monitoring in your environment, you really want to take a look at the security benefits event log management can offer you and your systems. Your logs

5 Critical Security Concerns That Every Sys Admin Should Check

IT departments may have a dedicated information security team or engineer whose primary responsibility is security, but each and every sys admin of any system on the network shares the responsibility for properly configuring and securing the systems in their

Utilizing a Network Scanner – Best Practices

Your auditor, your boss, or maybe that great book on security you just read, has you thinking you want to use a network scanner to help with the security on your network, but you’re just not really sure where to