The Art of Creating Strong Passwords While security has never been more important than it is today, the fastest way for an IT professional to become the most despised person in the company is to start enforcing a strong password policy. A policy perceived as overbearing may cause people to write down their passwords on a sticky-note near their computers, circumventing its very purpose. Your policy will be ineffective if your users don't know how to create strong passwords that are easy to remember. How to run your IT department into the ground There seems to be some nasty goings-on in the IT department of the Veterans Administration. The VA's inspector general is charging high-ranking officials in the agency's information technology office abused their authority, influenced the hiring of a contractor, engaged in nepotism, oh, and engaged some unadvised hanky-panky. Air Force foretells drone that can make attack decisions on its own By 2047 the Air Force says unmanned aircraft with blazing artificial intelligence systems could fly over a target and determine whether or not to unleash lethal weapons - without human intervention. U.S. Says SQL Injection Caused Major Breaches The huge data thefts at Heartland Payment Systems and other retailers resulted from SQL injection attacks and could finally push retailers to deal with Web application security flaws. Sony debuts HD security cameras Sony has unveiled a new range of high definition pan tilt zoom (PTZ) security cameras designed for surveillance and applications such as identification and motion detection. Report: U.S. Hotel Security Varies Widely Road warriors who travel frequently for business have likely seen a wide disparity when it comes to hotel quality. Soft sheets and accommodating staff may be the most noticeable factors, but what about safety and security? A new hotel management research study from Cornell's Center for Hospitality Research finds that safety and security equipment in U.S. hotels varies dramatically by size, location, and overall hotel class (For more on hotel W-Fi security, check out Dan Lohrman's blog post on the topic). Could Google be tricked into talking to botnets? Cybercriminals could start to take advantage of the popularity of search engines like Google as vehicles for relaying malicious code to botnets every time a particular keyword is searched for, said one Vancouver-based security expert. Lawsuit seeks to pry information from banks on account breaches Anti-spam company Unspam Technologies filed a lawsuit on Wednesday aimed, in a somewhat roundabout way, at forcing banks to divulge any information they might have about hacking activities affecting their customer accounts. August Giveaways Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31. Network World on Twitter? You bet we are |
No comments:
Post a Comment