Users don't get it (but it's human nature) "Why don't employees just PAY ATTENTION and FOLLOW OUR RULES?!?" Doesn't that sound like the cry from the heart of security managers the world 'round? Well, there's hope. Follow me today and next time on an excursion into current research findings and I'll show you a simple principle that will change the way you implement security awareness. IT security lacking in best practices The need for best practices knowledge was identified by 16% of respondents as the top IT security challenge affecting organizations today, according to a recent survey of 322 IT security professionals, undertaken by the ... VoIP requires strict attention to security best practices VoIP exploits are troublesome but not incurable nor unique to VoIP. Using log event management to combat insider threats Previously we wrote about CERT and the "13 best practices for preventing and detecting insider threats." Now we'll dig deeper into best practice No. 5: "Log, monitor, and audit employee online actions," and we'll look ... 13 best practices for preventing and detecting insider threats When you think of IT security, you probably think of keeping the bad guys out of your IT systems. But what if the “bad guy” is authorized to use those IT systems? Insider threats are real and not so uncommon. A survey conducted by the United States Secret Service, the CERT Coordination Center (CERT/CC), and CSO Magazine found that in cases where respondents could identify the perpetrator of an electronic crime, 20% were committed by insiders. Most switches help in complying with secure management best practices In assessing switch management and security, we sought to answer three questions: Did devices follow current best practices by default? Could users configure switches to follow these best practices? And could switches ... FAQ: How to protect your PC against the Downadup worm Security experts say it's the biggest worm attack in years, call it "amazing" and report that it infected nearly 9 million PCs in just two weeks. Cisco PIX to ASA configuration migration tool, time is running short Cisco releases a free migration tool for PIX to ASA migration ahead of the end-of-life for PIX on July 28. Top 10 YouTube hacking videos Hacking for fun, profit and to meet women. These 10 YouTube hacker videos range from the humorous to the downright frightening. Some of them demonstrate live hacks, while others demonstrate the use of hacker tools. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment