Security

23K

Solutions

23K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

We're more than halfway through August! Have you enrolled in the Course of the Month yet?

This month's featured course prepares you for the CompTIA IT Fundamentals exam. Premium Members, Team Accounts, and Qualified Experts get free access for 30 days. Enroll today to get started!
4
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE
LVL 4
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

10
 
LVL 14

Author Comment

by:Justin Pierce
It's wonderful to see everybody doing the right thing. ;)

:: Justin stands on soapbox::  

As a Combat Veteran, I'm disgusted by all white supremacist groups and the thought that they think they represent any values or ideals of the United States. I'm sure my military brethren (sisters, brothers, and transgenders) would give me a virtual high five when I say the US Army's official motto, "This We'll Defend" is a feeling that runs through all of our hearts and minds. We believe that this nation is for everyone who wants to come and be a part of it. Simply put, it's our job as Soldiers, Sailors, Airmen, Marines, and Coast Guardsmen, to defend them with our lives.

Oh, on the "race" element, according to science, Mitochondrial DNA, and I would say common sense, we are all one race (Human Race) and that the pigment of our skin is superficial. Race is a social invention, not a biological truth.

Who says?

Oh, only a prestigious and reputable school like: MIT and a preeminent evolutionary biologist Joseph L. Graves Jr.. Here is a conversation the NY Times had with him: Link.

Even if there were different races, why would I not call you my brother or sister? We are all experiencing the Human Condition together and should bond with, and defend each other as family.

I leave you with a quote from the fictitious, but ever so right, Jean-Luc Picard, "No being is so important that he can usurp the rights of another."

:: Justin steps off the soapbox::
5
 
LVL 2

Expert Comment

by:Christopher Rourke
Thank you, Justin. It strengthens my, and hopefully others, resolve to read such words. I too have often look to Captains Picard and Kirk in times like these to bring hope, but in this case there are words from a patriot of old that may serve as a greater compass:


The world is my country,
all mankind are my brethren, and
to do good is my religion.
- Thomas Paine
3
give-advice.PNGNo questions related to your technical expertise today? Share your advice in a post instead. Posts with technology advice allow other members to engage while creating a community you can rely on.
3
$1 Web Hosting Services – Better And Faster Than Anything Else

1 Dollar Hosting is all about the fantastic hosting experience we ever had before. Those who are looking for a budget friendly hosting services and business can easily continue with the same and look forward to having ultimate results. The very same hosting service will allow users to focus on content development, introducing various solutions and driving more visitors, while your website and hosting will be taken care by the best service provider.
Right professionals with the specialized knowledge integrating website content management on top, no matter what kind of website you are using or its make and model. Once you are with the right service provider for 1 Dollar Hosting services, just get ready to have a specialized support team capable of working with the operations to optimize everything you need to run your website. Not only this, their proven $1 Web Hosting knowledge and experience will surely give you the performance, reliability, and security, expected by each and every customer. Surely, it is the cheapest hosting service, but we can rely on the same to attain a maximum number of benefits, however, not to worry at all in terms of the site downtime, slow loading pages, any kind of errors and hacking and all.
It’s a high time when we should plan to move ahead with the best service provider for 1 Dollar Hosting services and get ready to have full surety on amazing website performance. With the help …
0
Beware - Variant of the well known locky (Diablo6) and mamba (DiskCryptor) are back.

Currently, there is no decryptor available to decrypt data locked by Mamba and Locky as well;
So watch out and educate your users to stay vigilant - old trick in phishing still valid hence detect those red flags to avoid being penetrated. Keep a disciplined cyber hygiene.
 
http://thehackernews.com/2017/08/locky-mamba-ransomware.html
3
Capture.JPG
Webroot Acquires Securecast, Launches Webroot Security Awareness Training

Beta Program Available Immediately to Help Businesses Reduce the Risks and Costs of Cyber Threats with End User Education

Webroot has acquired the assets of Securecast, a security awareness training platform. Building on Securecast, Webroot Security Awareness Training will give managed service providers (MSPs) and businesses a solution to reduce the risks and costs of phishing, ransomware, and other cyber threats with end-user education.

Webroot Security Awareness Training is available today as a beta program, with general availability scheduled for later this fall. The beta will allow participants to operate phishing simulations and provide a test course to address the weakest link in an organization’s security posture: the human factor. By combining the latest threat intelligence, technology, and training, Webroot enables businesses to reduce their security risks by continually educating their users and testing their awareness on cybersecurity best practices.

Explore Webroot Security Awareness Training

Webroot Security Awareness Training Beta Key Facts:
  • Webroot Security Awareness Training is a fully hosted Awareness-as-a-Service platform with an end user training program and a sophisticated phishing simulator.
  • The phishing
1
New in Windows security: Automatically log off suspicious users
Microsoft's Cloud App Security subscription service will boot users off the network, and out of apps and services, at the first sign of anomalous behavior.
0
7
Our team has been working hard to redesign the newsletter for the EE community! Check out August's newsletter and subscribe to receive the updated newsletter full of community articles, tech news, company updates, and more!
Looking forward to getting y'all's feedback.
7
The Future of Cyber Security - Facts & Predictions


Ransomware, one of today's biggest security threats, has become a massive growth opportunity for our channel. As key stakeholders fear now that their organisation will eventually be hit by a ransomware attack, they are willing to spend more on IT security solutions.
 
Join our Live Webinar on 24th August 2017
 
  • Why is NHS spending 50 million pounds to improve its cyber security?
  • Why are schools and top universities the perfect targets for the file-encrypting attacks?
  • How much are businesses willing to invest after their first ransomware attack?
  • How to remain competitive and win the cyber security market?


Register Now and Secure your Spot!
2
How Blockchain Is Impacting Every Industry
LVL 4
How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

4
 
LVL 12

Expert Comment

by:Andrew Leniart
Subscribed!  This newsletter subscription feature needs to be made a lot more visible to members in my opinion. I had no idea how to subscribe until I just read the subscribe link in this post.

Are copies of new newletters emailed to new subscribers? Or are members just notified of their release? If the latter, but what means? Email, On Site notifications or both?

Thanks..
3
 
LVL 2

Administrative Comment

by:Allie Watts
Andrew! I am so glad you are subscribed! The newsletter has been under a redesign lately and we are working with our engineers to update member email preferences on-site. Once the email preference center is finished, we will announce it and members will be able to opt-in and opt-out of specific email campaigns as well as the blog and newsletter!

New subscribers get the next newsletter if they missed the last one. Ultimately we will have a newsletter archive area on-site so you can go through them. Until then, our newsletters are being posted as articles. Check out the most recent one's content in the "newsletter" link in this post.

We do not have email or on-site notifications for newsletters. Subscribers just receive the newsletter in their inbox the next month or send after subscribing. Your first newsletter will come on September 7th!

Feel free to message me if you have any more questions! Thanks Andrew.
0
What technology do you think is a fad that won’t last?

Not sure it really qualifies as a "fad" because it's been around so long, but I'd say that a lot of existing password guidelines (special characters, changing them every 90 days, capitalization rules, etc.) are on their way out. Don't believe me? Even the creator of those rules now regrets them.

Although, I'm really looking forward to the day when passwords can just go away almost completely...
2
 
LVL 17

Expert Comment

by:Kyle Santos
Meanwhile, I just got this.  xD

Screenshot_2.png
Arrrggghhhhhh!
1
 
LVL 17

Expert Comment

by:Kyle Santos
Come to think of it.  After I graduated high school and started using computers more often I realized how difficult it was to remember passwords that had all those wacky requirements, so I started choosing last names of random people which is kind of similar to what xkcd had mentioned about four random words.  Admittedly, I was doing my best to try and work around difficult password requirements by making it easier for me to remember!  Take that, Bill Burr!
1
PriorityQuestions-SocialMedia-Onsite.jpgHave you tried to ask a Priority Question? Check out this article to learn how you can ask your questions and alter the priority of your issue to place it in front of topic Experts!
5
What is your favorite password manager?  I use the hell out of LastPass.  Love it's versatility and reliability, especially across multiple platforms.  It's ease of use and short learning curve has made it a valuable part of helping my clientele manage access to specific resources with fantastic results.  What are your go to's?
4
 
LVL 9

Expert Comment

by:Brandon Lyon
LastPass is the one I prefer. It's easy to use on most browsers & major platforms.
1
 
LVL 12

Expert Comment

by:Brian Murphy
Agree, as of this writing.  LastPass.
0
2
A phishing story

Just got a text from a number saying it is with Wells Fargo and that my VisaDebit card is temporarily blocked. Called the number and it asked for my credit card number. Nope. Hit 0 several times to get transferred to an operator and it hung up on me. I know I didn't have to do anything with the text because I don't bank with Wells Fargo, but figured I should spread the word in case anyone here does bank with them. I reported the suspicious message.

https://www.wellsfargo.com/privacy-security/fraud/report/phish/
2
 
LVL 7

Expert Comment

by:Brian Matis
Thanks for the head's up!
0
 
LVL 17

Author Comment

by:Kyle Santos
You're welcome.  Seeing the heads up on ATM machines having fake card readers is what really inspired me to spread the word.  Now I do this all the time with ATM and gas station readers haha
https://www.reddit.com/r/pics/comments/5ic7yc/thanks_reddit_you_saved_me_from_potential_credit/

And more hilariously the parody version
https://www.reddit.com/r/funny/comments/5icv18/thanks_reddit_i_jiggled_the_atm_a_little_and/
0
short.PNGShort sentences draw the eye amidst consistent scrolling. Give your posts a short one-liner to truly increase engagement in our community!
2
2
 
LVL 17

Expert Comment

by:Kyle Santos
If it walks like a dictatorship and talks like a dictatorship, its probably a dictatorship.  I've read perspectives of Russians saying their elections are a joke...merely for the sake of appearances.  On the other side, many Russians love Putin.  Trump and Ajit Pai are trying to repeal Title 2 so ISPs can monopolize one of the last things US citizens still have their own control over.  I guess the only difference between Russia and here (USA) is when a member of the administration in Russia is let go its not treated like The Apprentice: White House edition. xD
0
Just created a Sharepoint Slide Library on Office 365 but when I click on "Upload" then select "Publish Slides" I get the error "This feature requires Microsoft PowerPoint.  Either the application is not installed, or your browser is not configured to support ActiveX controls.  I have PowerPoint 2016 installed ( other users get the same error with PowerPoint 2010 installed).  I have also reset my IE (32 bit) security settings to default.  Any help would be greatly appreciated.
0
 
LVL 25

Expert Comment

by:Echo_S
I don't know.
0
 
LVL 24

Expert Comment

by:Brian B
Most Experts will not see this question because you put it up as a post. You should probably ask it as a question: https://www.experts-exchange.com/askQuestion.jsp
0
WatchGuard's M Series Appliances - Miecom Approved
WatchGuard's M Series Appliances - Miecom Approved

WatchGuard's newest M series appliances were put to the test by Miercom.  We had great results and outperformed all of our competitors in both stateless and stateful traffic throghput scenarios! Ready to see how your UTM appliance stacked up? Download the Miercom Report!

2
2
 
LVL 63

Expert Comment

by:☠ MASQ ☠
<  shhh .... we're not meant to talk about Fight Club ... ;)  >
2
QTT2017.PNG
In This Issue:
Streaming Malware Detection and Trends

More information here.

Although malware and potentially unwanted applications (PUAs) such as spyware and adware have been a top concern for years, many organizations still find themselves overwhelmed by the abundance of modern threats. This quarter, we examine malware trends, get insight from Webroot CTO Hal Lonas on dissolving security perimeters, and present findings from two recent surveys on how security professionals will focus their security efforts over the next year.

Get the latest Threat Trends Report now!
2
1
 
LVL 18

Author Comment

by:Lucas Bishop
The acquiring company inserts adware into thousands of people's browsers and they begin earning revenue from ad-clicks and affiliate sales. Eventually people notice and uninstall the extension.

It's a pump and dump scheme. Short term they multiply profits. Long term the extension goes in the trash.
0
 
LVL 7

Expert Comment

by:Brian Matis
This is why we can't have nice things... :-(
0
Does someone have experience with SaaS solution for network security management?
0
 
LVL 17

Expert Comment

by:Kyle Santos
Hi Asher,

Welcome to Experts Exchange.

Do you have a project in mind that you need someone to work on for you?
If yes, check out our Gigs platform.
https://www.experts-exchange.com/gigs/

If you want to look at members on the site you can go to navigation menu > Browse > Members.  There you can filter what type of expert you're looking for.
3
Skyport2-SocialMedia-LinkedInV2.pngDid you miss our co-branded webinar with Skyport Systems yesterday? Check out the recorded webinar available on-site to learn how to secure your Active Directory against security threats.
2

Security

23K

Solutions

23K

Contributors

Security is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide. Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things -– and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.