Archive for the ‘Guest blog’ Category

5 Best Practices for Patch Management – Business Edition

Sysadmins for small and medium sized businesses don’t have the time or the staff to spend weeks working out policies and procedures for patching… they need to get in, get it done, and get on with the other five jobs that they have to complete before lunch time. With that in mind, here’s a list [...]

Share

Helpful Tips to Cure your PC from Malware

Malicious ware (a.k.a malware) For someone who have used computer for a long time, it is impossible not to experience a virus attack in between that period. Similar to other viruses, computer viruses has a way of spreading throughout the cyber internet and duplicate each other. Virus whether a living thing or not can cause [...]

Share

RFS: Request For Security!

Rick Lawhorn, CISA, CISSP, CHP, CHSS As the industry prepares for increased regulations and compliance requirements from state and federal governments, businesses are taking a harder look at endpoint security. This emerging trend is starting to require businesses to re-evaluate their solution provider relationships and is potentially become a key market differentiator in forming new [...]

Share

Cars may need Anti-Malware protection as well…

The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars  (http://www.autosec.org/pubs/cars-usenixsec2011.pdf). The researchers found that, among other things, an attacker could disable the vehicle’s brakes, stop its engine, or take control of its door locks. All the attacker [...]

Share

5 Ways Event Log Management Makes You More Secure

While there are a ton of great reasons for you to implement event log monitoring in your environment, you really want to take a look at the security benefits event log management can offer you and your systems. Your logs contain a wealth of information that is worthless if no one is reviewing it. Here’s [...]

Share

5 Critical Security Concerns That Every Sys Admin Should Check

IT departments may have a dedicated information security team or engineer whose primary responsibility is security, but each and every sys admin of any system on the network shares the responsibility for properly configuring and securing the systems in their charge. Network security software is a great tool to assist sys admins with locking down [...]

Share

Utilizing a Network Scanner – Best Practices

Your auditor, your boss, or maybe that great book on security you just read, has you thinking you want to use a network scanner to help with the security on your network, but you’re just not really sure where to begin. Take heart, in this article we will go over what you need to know [...]

Share