• Security concern: Stored images on Panasonic copier

    Dumb question, but we leased a Panasonic digital copier at our work location and then at end of lease purchased it. We never had it connected to internet or networked, but it had the capabilities to scan and fax. It is being used as a copier alone but since we deal with very personal and sensitive...

    HELPBS5 pointsBadges:
  • Best method for locking down a workstation for guest use

    What is the best method for locking down a workstation for guest use? I have been looking at Steady State from Microsoft. Is this easy to setup? Will it prevent the system from being damaged from viruses or spy-ware? Is there a better option?

    ITKE352,380 pointsBadges:
  • I.T Security procedure

    How can I secure my network?

    Xxxdimagiba5 pointsBadges:
  • File deletion on the network

    I would like to set something up on our network in which if someone deletes a file or documents then the file or document is sent to a hidden folder on the network not just deleted. I would even like it to be put into the recycle bin but as it is people have deleted stuf off of my sever and it is...

    Sterling0125 pointsBadges:
  • Technical College vs. University

    Hello all- Would it be more beneficial to attend a technical college or university? A certain technical college, ECPI (www.ecpi.edu) in VA, has sparked my interest because they advertise 'they meet with some industry experts to discuss tech trends and what education needs to be put out to keep up...

    NeoCentric0 pointsBadges:
  • Who is responsible for Information Security?

    I'm an online at UAT and the question I ask is in regards to InfoSec should there be someone ultimately responsible or should there be a committee of different areas to make up the final task?

    zacpack5 pointsBadges:
  • Road to become a Security Auditor?

    Hi, I am really confused about way to follow to become a Security Auditor... and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799,...

    Ind5 pointsBadges:
  • How to implement secure file sharing between systems of different security levels

    Typical file sharing can create pathways between the systems of different security levels. I want to provide files (containing no sensitive data) from a secure system so that they can be read from low security systems, without having to ftp through firewalls which have more important duties. What...

    Columgrant15 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • computer security

    What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?

    hiwa7110 pointsBadges:
  • Security Implementation

    With the recent spate of news stories about the apparent information assurance/security failures that have come to light as a result of the events that transpired between Aaron Bar and Anonymous, I’ve been discussing security program implementation with my classmates at the Universtity of...

    Packetsneaker20 pointsBadges:
  • What is the best way to persuade a security manager to upgrade poorly outdated software/devices?

    I've mentioned security risk, not to mention how upgrading will do a world of good and provide more features to allow us to enhance our tools to make us more productive. I come from an ISP where IT was not a cost center. I may be spoiled, but we are running on Hoary, and everything is manual it...

    Mnemonyss5 pointsBadges:
  • Middle ground password security policies

    What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?

    TeachMeIT975 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • ISO 27001 help?

    Hello, I'm a student at UAT and am attempting to find out what would the best way be to implement ISO 27001 framework from the ground up. Has anyone here set it up from nothing, and what recommendations do you have starting this up?

    GasPerez20 pointsBadges:
  • Question about IT management software

    Hello, I am just wondering if anyone knows of some software available for IT departments, that say is accessible to users through a company intranet site where a user can go in and log an issue or problem with their system which goes into a database, then once the issue is resolved the user can go...

    Natethegreat0 pointsBadges:
  • Monitor Internet bandwidth

    Good day, We are using Windows 2000 Small Business Server in our organization with Exchange, DNS and ISA server configured. 1. I want to monitor the internet usage by the users. 2. I want to take a report on monthly or daily basis how much MB/GB utilized by each user. Thanks for your reply in...

    GiriPrasad0 pointsBadges:
  • How to monitor and manage LAN gateway from a Helius router?

    Hi everyone, I am trying to filter/manage a gateway through a Helius router for directway. We are running Windows 2000 Server with all XP clients, around 50 of them. We have active directory running with the domain controller handing out DNS and DHCP to clients. All clients are pointing to the...

    Kimberley0 pointsBadges:
  • What can we do to better protect ourselves from authentication-based attacks?

    According to the 2013 Verizon Data Breach Investigations Report, authentication-based attacks continue to plague enterprises as 80% of all attacks collected by Verizon (and other partners) were authentication-based. Who's to blame for these attacks? Well. Tom Bowers, regional security architect at...

    Michael Tidmarsh33,955 pointsBadges:
  • Computer misuse

    I was wondering if you could answer this question for me. I was given access to the HPI system (checks finance on vehicles) over 8 years ago through my employer. I thought this service was a free service as we are in the transport industry. I did 3 personal checks on this system (bearing in mind...

    marieg3935 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following