October 9, 2008  3:00 PM

Alternatives to e-mail attachments – SharePoint is risky!



Posted by: Troy Tate
administration, Data security, DataManagement, design, email, Exchange, Firewalls, intellectual property, Networking, Policy, policy enforcement, risk, Security, SharePoint, Storage, vulnerability, website

I'm looking for some help on this topic and have posted a question to the ITKE community. Hopefully someone out there has had some experience with this service for your...


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...


September 11, 2008  4:36 PM

RANT: Am I responsible for training technology staff at other companies?



Posted by: Troy Tate
administration, awareness, blog, CIO, Data security, DataCenter, DataManagement, design, Firewalls, Networking, Policy, policy enforcement, risk, Security, WAN

You may have seen in one of my past blog posts that we relocated a site over a weekend. As a result of that move we are continuing to clean-up various network access issues for...


September 8, 2008  4:49 PM

Did you see this? – 2007 Web Application Security Statistics Project



Posted by: Troy Tate
awareness, data loss, Data security, Database, DataManagement, Development, internet, malware, Metrics, Monitoring, Policy, research, risk, Security, tools, vulnerability, web, website, WWW


September 3, 2008  7:28 PM

Did you see (listen to) this? – Podcast on preventing spam



Posted by: Troy Tate
administration, anti-virus, awareness, Data security, DataManagement, email, Exchange, howto, internet, IT education, Metrics, Performance, podcast, Policy, reporting, risk, Security, spam, tools

An audio podcast on how SPAM is generated along with an examination on the frameworks and technologies that help manage and reduce SPAM. This may be a great tutorial for you and/or your users. CERTStation Media -...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 2, 2008  6:22 PM

Operation Sentinel – Manhattan becomes “Big Brother”



Posted by: Troy Tate
awareness, blog, Data security, dhs, homeland security, Monitoring, Policy, policy enforcement, Security

Hopefully you have read my previous blog entry about IT Equipment Search & Seizure at US Borders. Well, if that is not enough to make you think Big Brother is here...


August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:


August 20, 2008  6:19 PM

Did you see this? – Need some Exchange advice/support



Posted by: Troy Tate
administration, anti-virus, awareness, blog, CA, certificate authority, CIO, DataCenter, DataManagement, design, digital signatures, email, Exchange, Exchange 2007, howto, Microsoft Windows, Outlook Web Access, OWA, Performance, Policy, policy enforcement, Powershell, RSS, spam, toolkit, tools, web, website, wiki, WWW

Maybe you have already read my post about implementing new Exchange 2007 mailboxes for over 2000 users. If not... look here. So, as you see from this event, ongoing support...


August 14, 2008  2:58 AM

Managing risk & vulnerability



Posted by: Troy Tate
administration, antivirus, awareness, CIO, Data security, DataCenter, DataManagement, design, forensics, honeypot, IT education, malware, Monitoring, Policy, policy enforcement, risk, Security, vulnerability

Jotting some quick thoughts here after answering a user post. Thought I would place the same information here for all to see. This list is by no means complete and your thoughts are always welcome. Some ways to measure risk include: How valuable is the asset? How much of a threat...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: