Search This Blog

Wednesday, September 04, 2013

WindowSecurity.com - Complacency: the 8th Deadly Sin of IT Security (Part 1)

WindowSecurity.com - Complacency: the 8th Deadly Sin of IT Security (Part 1)

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Complacency: the 8th Deadly Sin of IT Security (Part 1) (on 4 Sept. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part1.html
In this article, I'm going to talk about how complacency manifests itself in IT security, discuss some examples of threats that IT pros overlook or downplay, and offer some advice on how to walk the fine line between complacency and paranoia.



Recent Articles & Tutorials
-----------------------------------------------------------------
Microsoft Windows Server Update Services - Voted WindowSecurity.com Readers' Choice Award Winner - Patch Management (on 29 Aug. 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Patch-Management-Microsoft-Windows-Server-Update-Services-Jul13.html
Microsoft Windows Server Update Services was selected the winner in the Patch Management category of the WindowSecurity.com Readers' Choice Awards. GFI LANguard and Lumension Patch and Remediation were runner-up and second runner-up respectively.

The Journey to ISO 27001 (Part 2) (on 28 Aug. 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/journey-iso-27001-part2.html
This article continues with the introduction to ISO 27001.

Big Data: The Security Perspective (Part 2) (on 21 Aug. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/big-data-security-perspective-part2.html
In this, Part 2, we will turn to a discussion of expert opinion regarding whether and how big data analytics can be used to detect and predict attacks, thus making it a tool for enhancing the overall security of your network.

Video: Change management for Active Directory - Part 1 (on 14 Aug. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-1.html
This video is the first part of two videos demonstrating change management for Active Directory.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: