• Open IT Forum: How do you raise awareness for security compliance in the enterprise?

    We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...

    MelanieYarbrough6,345 pointsBadges:
  • How to begin attempting to build and sustain security for our information assets?

    I recently learned about SKiP, Security Knowledge in Practice, in one of my classes at UAT and I am very intrigued by it.  I did not realize that the problem-based approach was the common.  I guess that is one of the great advantages of SKiP, being a process-based approach to organize and...

    JJUAT5 pointsBadges:
  • Changing proxy rights for select users

    I work in a company that has a proxy who can limit the people acces into some sites,my question is...what changes can i do to  the proxy server to accept these sites for one or more users?(usual changes into one basic proxy server)

    Razvan19875 pointsBadges:
  • Comprehensive distributed software management policy and standards

    Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?

    Debby10 pointsBadges:
  • Power Meter and Processor overheating

    I am facing a strange problem with my win 2000 server pc(256mb RAM, P4, 40gb hdd) as it automatically restarts when I start the computer. Yesterday it completely shut down before showing me the desktop and when I pressed the power button the initial screen came up showing message "the processor...

    BinooDas123410 pointsBadges:
  • Invalid login attempts in AS/400 SOX

    Hi, for SOX auditing I need to provide Information Security with a daily list of failed login attempts (any server type) and actual logins for a list of sensitive accounts. Straightforward stuff on other platforms but I can't see how it can be done on i5/OS. I have seen a few references to doing...

    londonunixguy5 pointsBadges:
  • SAS type 2 audits

    Hello If a customer don't wants to execute the SAS70 type 2 audit - is there any other compliance standards that you can choose from ? That is to get the same compliance documentation/status but not execute the SAS70 type 2 audit? Is there any light version of the SAS70 standards?

    OddLeth5 pointsBadges:
  • iSeries Net Time

    We are going through a PCI audit and it was suggested that we implement NET Time on the AS400. How do I do that?

    CharlieBrowne51,140 pointsBadges:
  • Creating abuse and postmaster exchange account

    How do I create an abuse and a postmaster exchange account to be in compliance? I am using Exchange 2003 and Outlook 2007.

    NewnanIT1,110 pointsBadges:
  • Compliance for Video Conferencing

    Greetings, We are currently in the planning phase for our first video conferencing solution. Does anyone know if there are any regulatory compliance requirements that need to be considered (i.e. conference archiving)? Thanks.

    Peanve0 pointsBadges:
  • Is compliance preventing you from moving to the cloud?

    Are compliance concerns (such as PCI DSS) or more general data security concerns preventing you from moving data to the cloud? What would be required for you to reconsider your position?

    ITKE409,400 pointsBadges:
  • Blocking password changes until audit is complete

    Tell me how would it be possible for our organization to block password changes until our audit can find who has weak passwords? How can we find out current passwords using Windows 2003?

    Troubleshooter24755 pointsBadges:
  • Compliance SOX certification

    Hello, I'm looking to acquiring SOX certification. Are there any additional compliance certifications that your would recommend and through which vendor?

    Debby10 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • iseries access windows 7 compliance

    Is IBM iseries access compatible with Windows 7(x64)

    Dkalar5 pointsBadges:
  • System Administrators Access in a HR/Payroll System

    Hi I have taksed to define the access rights for sys admins for a HR/Payroll system. The thoughts are divided among the groups here - one, the segretion of duties that should limit any type of user to perform tasks end to end since this is a payroll system; two since it is a sys admin access the...

    Cognos20015 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Are there any government restrictions or recommendations regarding Active X Trusted Add-ons?

    Are there any government restrictions or recommendations regarding Active X Trusted Add-ons?

    SeaEagle5 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41060 pointsBadges:
  • RAID1 on computer with 2 internal hard-disks

    I have two identical hard disks in RAID1 array (no additional hard drives are available). There is a CD/DVD drive and USB. I need a solution for both Windows XP and Linux OS, but as single-OS, no dual booting.   I’ve run into several hassles: Upgrading Linux kernel on a machine where one boots...

    ITKE409,400 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following