![How to Monitor Windows Event Log for Reboots How to Monitor Windows Event Log for Reboots](https://i0.wp.com/www.mlakartechtalk.com/wp-content/uploads/2020/05/Wood-Logs.jpg?resize=809%2C607&ssl=1)
When was my server last rebooted? Who shutdown my machine? Read on to see how easy it is to find out using the Windows Server Event Logs.
Read More »Software security topics
When was my server last rebooted? Who shutdown my machine? Read on to see how easy it is to find out using the Windows Server Event Logs.
Read More »Like water flowing downhill, attackers will take the path of least resistance to compromise a system. Old technology that doesn’t learn new tricks is a prime target.
The ACM published an article in the Communications of the ACM by Keith Kirkpatrick which delves into security issues with SCADA systems.
Read on about SCADA systems and the security implications of old technology.
Read More »More and more countries are considering various types of bans on encrypted communications. Germany is thinking about it. So is the UK. Australia is actively pursuing it too.
Read on to hear why encryption bans are a bad idea.
Read More »Many times when people think about security principles the one that jumps out to them is the principle of least privilege. However, there are other security principles to consider. Let’s look at 8 security principles laid out decades ago that are still relevant today.
Read More »The proliferation of online login accounts has made our lives easier and more convenient to gather information, pay bills, etc. However, it comes at a cost. Our password management hasn’t changed much – and that creates a vulnerability that can really hurt.
Read on to see the pros and cons of password management systems.
Read More »Using a VPN is critical for protecting yourself online and maintaining a level of privacy. It might sound technical and intimidating but it is as easy as checking email – and the benefits are significant.
Let’s discuss what you can do and why to stay safe online.
Read More »Recently there were two huge data breaches of two very large companies. Both organizations collected a ton of information about their clients. The breaches were both spectacular in scope. Furthermore, both were among the largest known data breaches.
I see a large contrast between the Marriott breach and the Equifax breach. The difference between the two massive breaches clearly demonstrates the importance of basic security methods.
Read More »Many years ago Microsoft published a list of the “10 immutable laws of security”. The page has since been removed; however, another version popped up with very slight changes.
Read on the see the security principles from decades ago which are still prevelant today.
Read More »About 3 years ago in 2015, chip based credit cards were rolled out in the US. However, the amount of fraud has not decreased in the US. Why is this happening and what can be done? Read on to see…
Feature Image / License / https://informedmag.com/
Since 2004 the Department of Homeland Security has organized October as National Cyber Security Awareness Month. The goal is to promote cyber security to help keep Americans safe online. Fast forward 14 years and the security landscape has only become more dangerous. More opportunities exist for online abuses than ever before. The proliferation of internet connected devices that comprise the IOT creates additional attack surfaces which often have security as an afterthought instead of baked into the design.
Today I want to focus on the low hanging fruit i.e. the easy wins we can achieve to significantly improve our online safety and security. Read on to see the simple things most people can do to improve their situation.