When was my server last rebooted? Who shutdown my machine? Read on to see how easy it is to find out using the Windows Server Event Logs.
Read More »Category: Security
Software security topics
The Weakest Link – Protecting Industrial Control Systems
Like water flowing downhill, attackers will take the path of least resistance to compromise a system. Old technology that doesn’t learn new tricks is a prime target.
The ACM published an article in the Communications of the ACM by Keith Kirkpatrick which delves into security issues with SCADA systems.
Read on about SCADA systems and the security implications of old technology.
Read More »Encryption Bans – Efforts to Ban Encryption
More and more countries are considering various types of bans on encrypted communications. Germany is thinking about it. So is the UK. Australia is actively pursuing it too.
Read on to hear why encryption bans are a bad idea.
Read More »InfoSec Design Principles – 8 Security Principles To Implement
Many times when people think about security principles the one that jumps out to them is the principle of least privilege. However, there are other security principles to consider. Let’s look at 8 security principles laid out decades ago that are still relevant today.
Read More »Why You Should Use a Password Manager – The Pros and Cons of Password Management Systems
The proliferation of online login accounts has made our lives easier and more convenient to gather information, pay bills, etc. However, it comes at a cost. Our password management hasn’t changed much – and that creates a vulnerability that can really hurt.
Read on to see the pros and cons of password management systems.
Read More »Why You Need a VPN – Protect Yourself Online
Using a VPN is critical for protecting yourself online and maintaining a level of privacy. It might sound technical and intimidating but it is as easy as checking email – and the benefits are significant.
Let’s discuss what you can do and why to stay safe online.
Read More »Marriott and Equifax – A Tale of Two Breaches
Recently there were two huge data breaches of two very large companies. Both organizations collected a ton of information about their clients. The breaches were both spectacular in scope. Furthermore, both were among the largest known data breaches.
I see a large contrast between the Marriott breach and the Equifax breach. The difference between the two massive breaches clearly demonstrates the importance of basic security methods.
Read More »Security Principles – Time Tested and Immutable
Many years ago Microsoft published a list of the “10 immutable laws of security”. The page has since been removed; however, another version popped up with very slight changes.
Read on the see the security principles from decades ago which are still prevelant today.
Read More »The Security Theater of Chip Cards
Feature Image / License / https://informedmag.com/
National Cyber Security Awareness Month – Low Hanging Fruit
Today I want to focus on the low hanging fruit i.e. the easy wins we can achieve to significantly improve our online safety and security. Read on to see the simple things most people can do to improve their situation.