Category Archives: Information Security

Back to work: Security Thoughts to Have
In fact, with so many people returning to the office and potentially accessing sensitive information on your organization’s network, it’s more important than ever to ensure that proper security measures are in place. Either fully remote or fully in-the-office work can be thought of as a “fortress” approach to security, with the primary point of access being through the employee’s personal or organizational computer.

How to protect yourself from email scams
What to look for (or what I look at), to avoid an email scam during this holiday season…or really any season.

Q&A Monday: What is CVSS?
Question: I am a recent graduate, who just got a job working in IT at a company. During a meeting today, someone mentioned a CVSS score on a system that needed to be patched. I was afraid to ask during the meeting, but what is CVSS? Kenneth M. PonceWashington DC Answer: Before I get to…

Rise of the BISO and what it says about IT Security
I have to admit, until very recently, I have never heard of a BISO (Business Information Security Officer), and the first time I came across this title, I was a little confused. I at first thought that it had something to do with physical security or maybe keeping business’ financially secure…and I was wrong. If…

Q&A Monday: To Anti-Virus or Not to Anti-Virus, that is the question!
Question: I will be in the process of renewing my AntiVirus software at the end of this month, I’m currently using Norton, should I stay with them or should I go to another software company for my AntiVirus? Marcela NowickiCanyonville, OR Answer: I love this question, for the fact that no matter how I answer…
Protect the Executives
For years, I’ve advocated spending extra attention to accounts on a network that once compromised, can cause devastation to the environment. Depending on what industry your work in, these are Executives, VIPs, Politicians, or even the C-Suite, whatever you call them, these are accounts, you may not have considered dangerous, but they can be. The…

How to Improve your enterprise E-mail Security
One of the things that I’ve noticed during my time is that phishing emails, ebb and flow like the waves of the ocean. It seems like nothing significant for a few weeks, then the flood gates open and a bunch all come in a short period of time. The security, mail and support teams get…

Information Security Core Knowledge
Every so often, I get asked by someone who wants to get into the InfoSec field, what is at the core of knowledge that is needed. Now I know a lot of people have a lot of different answers to this question, but I think there are some things that are important, that are easier to attain.
Upgrade BackTrack 5 R1 to the new R2
If you are anything like me, you hate to wait for things and here’s a time you can get the information before the release. BackTrack R2 will be released on March 1st 2012, but there are directions to make all the upgrades today, all you need to do is follow the directions below, and you’ll…
WARNING: Facebook Malware Attack
A Facebook phishing attack is on the loose this weekend. The attack attempts to steal your Facebook login credentials, install malware on your computer, and even get your home address. The attack is spread via a “hilarious video” posted to Facebook walls, via a report on WebSense, when the wall post is clicked, a form…