Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

What could affect access_token behaviour? The question rises from a programming problem that an URL gives access to login information and functions in a site when opened in a mobile device browser, but works properly with no security leaks on PC?
0
On-Demand: Securing Your Wi-Fi for Summer Travel
LVL 1
On-Demand: Securing Your Wi-Fi for Summer Travel

Traveling this summer?Check out our on-demand webinar to learn about the importance of Wi-Fi security and 3 easy measures you can start taking immediately to protect your private data while using public Wi-Fi. Follow us today to learn more!

Hi,

Our company has installed a few Layer 2 Cisco 2960x switch (Stackable). Currently the switches has been configured with a few VLANs to separate the network traffic from one department to another. There is a Routing with Firewall function device (Not managed by our team) which major function is to route traffic between our VLANs. Whenever we need to open certain ports (e.g. tcp, upd or ICMP), we need to send a request to the team who take care of the firewall function device and the lead time takes almost 2 weeks. I am not sure the model of the routing/firewall devices but seems to be Cisco nexus as well as Fortigate firewall.  Our management would like us to take back the firewall security setting control by our own team. Based on just a few Cisco 2960x (Layer 2 switch), may I know is it possible to use ACL (Standard or Extend) to control the routing between VLAN based on Host IP Address and port from one Vlan to another. Do we have to purchase new equipment in order to accomplish our goal or just make use of the Cisco 2960x switches. Our plan is that the routing function is still leave it to the other team and allowing traffic of any-to-any. We can then make use of the Cisco 2960x ACL (Access List) to deploy a more restricted security control and not sure if it is technical possible.  As we are a bit new to the Cisco Technical implementation and your kind advice is very much appreciated.

Thanks & Regards
Patrick
0
Long story short - My client did not agree to an end to end backup solution and lost everything to ransomware.

Situation:
-Client has 1 Poweredge R710 that I will be rebuilding with Server 2016 Datacenter. I plan on two VM's, one for the DC and one for a Fileserver.
-The client only has roughly 100GB of live data, so retention is flexible.
-The client has about 10 workstations, I'm thinking about using Synology Cloudstation for local file backup on the workstations.
-The client is now letting me acquire 2x Synology NAs devices (DS718+)
-The client is still not willing to pay for a well known 3rd party solution like Datto/Veem etc. *sigh*
-I do have an existing license for Altaro that I may as well use


Question:

Since I am starting from scratch, with more hardware, I have an opportunity to be a little more creative.

Getting a backup done via Windows, Altaro, and/or Synology "Active Backup" is straight forward enough. How to be sure I am protecting the client from ransomware to the best of my ability is where I would like some advice.

One NAS will be off site storage. For the on site NAS, Should I set up an ISCSI drive with security on the Host Server? What other security concerns can I be sure to cover ahead of time as far as accessing and storing these backups?

I know the NAS has its own built in accounts which I'm guessing will protect the offsite backups from credentials being compromised.
0
Hi all,

we are searching for the best endpoint protection available for SMB. I am looking for the top 3. Currently we are working with Kaspersky Endpoint Security.

Anyone any suggestions?

Thank you,
0
Managed Security Services Providers
This blog is going to brief readers about a new way for enterprise cloud data protection i.e., Managed security services. One will come to know the business challenges in securing data faced in the current scenario and get familiar with ‘what is MSS in cloud’ with all associated technicalities.
0
We will soon be starting a relationship with a company where we will be allowing them to send emails to our customers on our behalf from their mail provider using our domain name. They are using Amazon Ses, and they have asked us to add the amazonses.com domain as an allowed sender in our SPF record. We are going to do this, but I am a little uncomfortable with the risk of any potential Amazon cloud customer having the ability to spoof our domain and pass SPF. Because of this, I am looking into implementing DKIM and having the third party sign their messages with a private key.

I want to implement DKIM for our own domain's email messages as well. I have been reading up on DKIM, but it gets a little confusing when third party senders become involved. I am looking to see if anyone can provide me with a best practice for this situation.  If I create a private/public key pair for our domain, I am guessing that it is not recommended practice to provide that key to the third party and tell them to use the selector name I make up. I have come across different articles describing the use of multiple selectors, but I admit I am finding them confusing. Can I have two different private keys for the same domain? Then I could give them one private key for their emails and have a separate key for our emails? Do I use the same private key, but create two selectors for my domain? Then provide the third party with the private key and tell them to sign using the alternate selector? At that …
0
I am getting the following error message with Quickbooks when using RDS 2016.

I have this setup with other servers and this error does not appear.

Things I have already checked:
  • Verified that IE Enhanced Security Configuration is disabled for both users and administrators
  • I have even enabled a GPO to set the Internet zone to medium

Neither of these settings have helped, on this particular server.

Once you click cancel on the error, everything works but it's an annoyance.

Anyone else have any ideas on a fix?

Quickbooks error
0
Hi all, i was wondering if you could help.

I've have recently had to use GPO to remove users local admin rights to their PC's. Due to the environment i work in, they are able to opt in and out of this (don't ask). So, i have setup two OU's "Admins" and "Non_Admin".  

Non Admins have the below setting -

Comp Conf --> Pref --> Control Panel Settings --> Local Users and Groups

The policy removes any local rights and then adds only domain admins.

Fine, just the way i want it. Now for my query...

When i move computers to the "Admins" OU i have to manually add their domain accounts back (being removed from the above policy)  via Computer Management --> Local Users and Groups --> Groups --> Administrators

I was hoping i could find away in GPO to set something under "Admins" to add just* their domain accounts back in!  

Just a time saver really and would really appreciate any ideas. I'm sure there is a way!

Thanks as always,

 Danny
0
Hi,

I need assistance how I can disable / close network discovery on LAN for Servers and all Clients please.


Regards
Asif
0
Want to host a new website at linode cloud, is it good choice compared to google & azure or other cloud solution? Any concern about choosing cloud including IT security?
0
The Firewall Audit Checklist
The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Error: ActiveX cannot create object (800A01AD)

Creation of a shell object is blocked on some of the systems managed by a third party that are under my control.  I've attempted to automate some scripting in VBS and in PowerShell (see snippets below) that works just fine in win7 and win10.  The snippets are geared at logging the URL or Title of any website in any active ie11 window and continue logging (date / time and URL) until all instances of ie11 are closed.

The scripting works just fine on my test environment, other systems under my control that are not managed by third parties, and every where i can test it. The wording, spelling, grammar, etc are all correct so there is a security setting on the system that is prohibiting the use of objShell.windows.  Under VBS, it gives the error message above and in Powershell, it says object not registered.  Both scripts error out on the last line of the snippet. The remainder would work but something is blocking the creation of "windows" object.

Any input would be appreciated.  I have a security flaw in internet explorer that i need to cover by logging URLs and cannot use third party software or complex coding (long story). To note: this is being deployed in win32 instances of win7. i have test ran this with win32 and win64 versions of cscript and it works fine in the test environment. But on those systems managed by the third party, it's only win32 instance.  

VBS:

dim objShell
dim objShellWindows
dim fileStr, …
0
Coming up with a good network security checklist can be challenging. The list below was created with input from not less than a dozen technology consultants and security experts.
3
 
LVL 18

Expert Comment

by:Andrew Leniart
Comment Utility
A very handy baseline checklist. Great work. Endorsed.
0
Hi

I have a folder on a server that has restricted access to authorised people.

Within that folder is sub folders that are for individual people who authorised to access.

Is there any way I can set it so that only the individual person can view instead of having to password protect.
0
Hi, i am having an issue with IIS 10 and my PCI DSS Scanning.

I keep getting the below feedback. However in the release notes for IIS 10 it said you can block this information by going in to the configuration editor > system.webserver > Security > request filtering and changing "RemoveServerHeader" to True.  I have done this for the default web site and Exchange Back end.

However the results still come back the same, i know i can use URLrewrite or some other method, however if its now built in to IIS 10 i would like to try and figure out why it wont work.

Thanks in advance for any help.

"Web Server HTTP Header Information Disclosure"
"Server type : Microsoft IIS"
"Server version : 10.0"
"Source : Microsoft-IIS/10.0"
0
I am handling a Disaster Recovery project which involves contractors/service providers. Can you share with me the following document/template below which you have used before in recent projects?

1. Non-Disclosure Agreement (NDA); and
2. InfoSec Compliant Statement.

Thanks a lot for your help in advance.
0
While my current org does not fall under the GDPR umbrella, who knows in the future...I know the policy requires a breach notification within 72 hours but I'm not clear who should be notified within this period of time.

Thank you for your help!
0
Hello and Good Evening Everyone,

             I set up a Google Chromebook for my roommate tonight and connected it to our wireless network.  I simply selected our wireless, entered our password, and left the box below it checked by default which brings me to this upcoming question.  By leaving this checked, will it allow people outside of our home to automatically connect or share our wireless?  If so, how can I go back and uncheck or deselect it?  I did all of this in a hurry fashion, so, I might be mistaken on what was read.  I believe the area that was automatically checked had the message of allowing other devices within the home to share this network.  

              Any feedback provided in response to this question will be greatly appreciated.

              Thank you

              George
0
Our O365 implementation is working correctly. As part of our signin, our onprem ADFS redirects users to our sts.(domain).com URL as expected so we can enter our AD credentials and get redirected to the Cloud - this all works perfectly fine. However, my Security team noted that either from our internal network or from any computer on the internet (like your kid's laptop from home) - you can enter the sts.(domain).com URL for our company - and get our sts default IIS web page displayed. Our Security team would like that page to NOT be available to browse to directly. How can i go about doing that - without stopping the sts site from working for login? Example of URL is attached.
STSpageExample.png
0
Fraud Alert
Hackers are getting into PayPal accounts, then using eBay accounts to make purchases and have them shipped to an intermediary address that redirects the package overseas. If you ship to them, good luck getting your money or your item back.
0
Improve Your Query Performance Tuning
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

This issue just happened recently. I have several users' desktops having issue getting a DHCP IP address. The strange thing is it only happens on the desktops. I have no problem with a laptop plugged into the switch port. I did a Wireshark captured and it did not show anything interesting. The only thing it showed was the DHCP discovery from the desktop. Any ideas what could cause this?

 

PS. I have port security configured on my Catalyst 4503. But even with port security disabled, the desktops still could not get a DHCP IP address.

 

Thanks
0
In exchange 2010 environment, I have one "mail Universal security group"

I need to make changes to this group:

- Change its Name
- Change the Alias name
- Change the primary email address
- Leave all the members untouched.

There are about 20 users in this group currently and this group may be applied to various folders for security on file servers. I therefore do not want to delete it completely and recreate it because that will cause the security on file permissions to break. I am not sure if by changing the Alias name will it cause file permissions to break ?

What can I do to ensure that the name, alias name and email address is changed without affecting anything else.

Thanks very much!

Nick
0
We have noticed with some of our Windows 10 computers lately that Security updates get downloaded automatically and then the users say that their computer does a  reboot  without any warning message. We do not see this or hear of this from all of our users and these users are all using laptops.
Is this the new way of Microsoft getting these updates applied or is this just some users ignoring the reboot message of the computer when a Security update gets applied?
0
I would like to hear responses to this question

In information security, what is the difference between a table top exercise and a full blown operational exercise with a red team and blue team?
0
Hello all,

I am seeking advice for a home surveillance DVR system but I cannot find a system that meets my requirements.

[EDITED WITH UPDATED DETAILS]

Hello all,

My main disappointment comes from the apparent reality that no one seems to offer a hybrid WiFi and Wired DVR box. I don't know why because I can imagine that nearly everyone has an environment where some points allow for wired cameras and other places around their home are more suitable for a WiFi camera.

In my case, the DVR and my outside patio camera allow for an easy wired camera install but nearly every other point (door), kitchen/dining room are more suitable for WiFi.

My requirements are really modest for a home surveillance system.

  • DVR box with 1 - 2 TB hard drive for a month or so worth of recording.
  • Automatic email notifications when a specific threshold is met.
  • Access to live and recorded video via smart phone
  • 2 wired cameras, 2 WiFi cameras and expansion to 8 cameras
  • Ideally - A peep hole camera for our front door (not sure why this is so difficult to find).

Currently, I have a Lorex surveillance system and I have two WiFi cameras. The WiFi cameras are not integrated with the Lorex, so I have multiple applications and I really want to replace all of this with a single system.

Thank you.
0
Both Norton security and McAfee security product support are unable to access via logme in - been fighting malware on this all green both products even Malwarebytes
ran npe  see attached: c:\windows\drivers\iqvw64e.sys
ran malware bytes with everything  ok.
Iknow its not ok the report shown attached keeps showing up - PLEASE HELP THIS IS URGENT. Howe can I gather more data on this to stop it and ultimately eliminate it?
nperesult.png
0

Security

25K

Solutions

24K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.