The best 35 information security blogs to follow

Whether you prefer bookmarks, RSS feeds, or mobile readers, keeping up with information security trends and developments is made infinitely easier through the work of great bloggers.

Continue reading

Security 101: Authentication (Part 2)

Welcome to part two of our three-part series on authentication. In this post we will review some of those that are used in networks.

Continue reading

23 ways to be the IT department’s MacGyver

Here is a list of things you may want to keep nearby so that you too can pull off a “MacGyver”.

Continue reading

Is there a severity greater than critical?

It’s Patch Tuesday again and it’s really time you paid attention. A lot of attention. MS15-011 covers a security issue that, were I in charge of the ratings names, I would rate as Super-critical – because of the potential for exploitation more than its potential impact. If you have anyone taking a domain-joined workstation outside the corporate network, patch it now.

Continue reading

Security 101: Authentication (Part 1)

In this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.

Continue reading

Introduction to permissions, Part 4: Troubleshooting permissions and best practices

In the last part of our Permissions series, we’ll look at troubleshooting permissions and some best practices.

Continue reading

Security 101 – physical security

Your staff travelling with company IT resources should be aware of their surroundings and take basic precautions to safeguard the equipment and data in their care. Here are some of these basic physical security best practices.

Continue reading

Insider threats are alive and very (un)well

What should a company do when users, whose roles require access to sensitive data, misuse that access? What precautions can companies take to reduce both the risk of this happening, and the damage that can result from insider activity?

Continue reading

Patch management could save you big bucks… and a fine

We all know that patching is something we should do. Some of us even consider it something we must do. But I don’t think any of us consider how much it could cost us if we didn’t, so take heed of the following object lesson. Anchorage Community Mental Health Services (ACMHS) was fined US $150,000 […]

Continue reading

Security 101: at rest or in transit – protecting data with encryption

In previous articles, we discussed encryption and the algorithms used. In this one we take a look at their practical application.

Continue reading