• Security Policy Confidentiality

    Some of my customers are asking for copies of some of our security policies. I mentioned that the documents were confidential but they insist on providing evidence that the policies exist. Should I give them a copy? These customers all have NDAs with my company.

    Vper10 pointsBadges:
  • Outlook web security

    I updated the S/MIME for Outlook Web access and now I can't paste text into a message. In some browsers I can paste, but Hyperlinks are removed. How can I fix this or uninstall the S/MIME?

    Mahonmobile5 pointsBadges:
  • Security Permissions on Shared Folders

    I have a resource server that serves a large number of users.  We place all of our user accounts in groups based on their geographical location and organization function.  We limit the permissions on folders to read/ srite, execute and delete. However, we do not give Full Control permissions. ...

    KennyB295835 pointsBadges:
  • Best way to lock down and secure Windows Server 2008

    What is the best way to lock down and secure a Windows server 2008? We want to block all remote connections and secure passwords and what not.

    Troubleshooter24755 pointsBadges:
  • Password policies that aren’t too crazy but effective

    What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?

    TeachMeIT975 pointsBadges:
  • Defining security policies for OU

    How can I define security policies for each OU in Windows server 2008using Active Directory?

    ITKE351,865 pointsBadges:
  • Can a company do an ISO 17799/27001 certification in-house?

    Can a company do an ISO 17799/27001 certification in-house or does it require a third party to come in and do it? what about after that - are recertifications required or can that be done in house with an internal auditor?

    Security Channel ATE15 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • WEP password cracking without SSID

    Can a WEP password really be cracked in under 5 minutes with a packet sniffer? Is this true even if the site does not have a SSID?

    NewnanIT1,110 pointsBadges:
  • Blocking weak passwords from our system

    Is there a way to block a list of common passwords from our network even though they fit the complexity rules they are still weak like p@$$w0rd.

    TeachMeIT975 pointsBadges:
  • What’s the suitable protection level for internet-connected desktop?

    What is the suitable protection level for an internet connected desktop nowadays? Is it antivirus, antispyware and antispam? Or is it more/less?

    MelanieYarbrough6,345 pointsBadges:
  • Securing SIP signaling without deteriorating VoIP traffic

    How can we lock down and secure all of our SIP signaling so that it is not readable as plain text? The solution can not deteriorate the VoIP traffic either.

    NewnanIT1,110 pointsBadges:
  • Open IT Forum: Recommendations for network security books

    I'm compiling a list of the best books on network security. What are some of your favorites, perhaps with a brief description? All contributors to the list will receive 100 knowledge points!

    MelanieYarbrough6,345 pointsBadges:
  • Website monitoring suggestions?

    Suggestions for website monitoring? Is there something that monitors for security vulnerabilities?

    NewnanIT1,110 pointsBadges:
  • How to secure MySql server?

    How to secure a MySql server for webhosting?

    Ashishagw5 pointsBadges:
  • Comprehensive distributed software management policy and standards

    Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?

    Debby10 pointsBadges:
  • Restoring file from NTBackup

    Is it possible to restore file from an ntbackup operation to another server and if so is this a security risk?

    NewnanIT1,110 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Open IT Forum: What security-related lessons have you learned?

    What is the hardest or most costly (whether it be time, money or pride) lesson you or your company has learned regarding security? We want to hear your security-related stories, concerns and blunders in the discussion area. The most entertaining or insightful stories have 200 knowledge points...

    MelanieYarbrough6,345 pointsBadges:
  • Microsoft’s Defender management and monitoring

    Can Microsoft’s Defender be managed centrally from a server? Can I review logs across the domain? Is this possible or is there a similar corporate offering from Microsoft?

    NewnanIT1,110 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following