• Blocking weak passwords from our system

    Is there a way to block a list of common passwords from our network even though they fit the complexity rules they are still weak like p@$$w0rd.

    TeachMeIT975 pointsBadges:
  • What’s the suitable protection level for internet-connected desktop?

    What is the suitable protection level for an internet connected desktop nowadays? Is it antivirus, antispyware and antispam? Or is it more/less?

    MelanieYarbrough6,345 pointsBadges:
  • Securing SIP signaling without deteriorating VoIP traffic

    How can we lock down and secure all of our SIP signaling so that it is not readable as plain text? The solution can not deteriorate the VoIP traffic either.

    NewnanIT1,110 pointsBadges:
  • Open IT Forum: Recommendations for network security books

    I'm compiling a list of the best books on network security. What are some of your favorites, perhaps with a brief description? All contributors to the list will receive 100 knowledge points!

    MelanieYarbrough6,345 pointsBadges:
  • Website monitoring suggestions?

    Suggestions for website monitoring? Is there something that monitors for security vulnerabilities?

    NewnanIT1,110 pointsBadges:
  • How to secure MySql server?

    How to secure a MySql server for webhosting?

    Ashishagw5 pointsBadges:
  • Comprehensive distributed software management policy and standards

    Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?

    Debby10 pointsBadges:
  • Restoring file from NTBackup

    Is it possible to restore file from an ntbackup operation to another server and if so is this a security risk?

    NewnanIT1,110 pointsBadges:
  • ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Open IT Forum: What security-related lessons have you learned?

    What is the hardest or most costly (whether it be time, money or pride) lesson you or your company has learned regarding security? We want to hear your security-related stories, concerns and blunders in the discussion area. The most entertaining or insightful stories have 200 knowledge points...

    MelanieYarbrough6,345 pointsBadges:
  • Microsoft’s Defender management and monitoring

    Can Microsoft’s Defender be managed centrally from a server? Can I review logs across the domain? Is this possible or is there a similar corporate offering from Microsoft?

    NewnanIT1,110 pointsBadges:
  • Website redirect to corporate policy page

    We want to block the websites facebook and twitter. We want those pages to redirect to a page displaying company policy on browsing to social sites from our corporate network. How do we go about doing this?

    TeachMeIT975 pointsBadges:
  • Assigning user passwords & security policies

    Just a broad security question: How do you assign your users' first password? Do you require they change it immediately? What is the best method for security purposes?

    Troubleshooter24755 pointsBadges:
  • Computer Information Technology

    Im currently enrolled in Computer Information Technology, and concentrating on Network admin and Security. What courses do i need to enroll in to be compatiable.

    Tbelcher5 pointsBadges:
  • Best method for locking down a workstation for guest use

    What is the best method for locking down a workstation for guest use? I have been looking at Steady State from Microsoft. Is this easy to setup? Will it prevent the system from being damaged from viruses or spy-ware? Is there a better option?

    ITKE344,850 pointsBadges:
  • Security concern: stored images on Panasonic copier

    dumb question, but we leased a Panasonic digital copier at our work location and then at end of lease purchased it.  We never had it connected to internet or networked, but it had the capabilities to scan and fax.  it is being used as a copier alone but since we deal with very personal and...

    HELPBS5 pointsBadges:
  • Outsource SOC … who is good?

    Which companies should i contact to solicit info about their willingness to provide outsourced SOC services to a large company?

    Wiseoldfan5 pointsBadges:
  • Need a way to audit ANY change access to selected database files.

    A client has had a request from auditors that they should be able to audit every change to three critical database files when I am remotely signed on to their ISeries. They would want to turn on and off the auditing so that it is NOT on all day while being hit by 100's of customers. I vaguely...

    Harkabus10 pointsBadges:
  • how to secure iSeries Files from unauthorized SQL & FTP commands from a windows application.

    Any ideas on how to lock users out of the capability to run remote ODBC/SQL/FTP commands that update iSeries production data from within a PC application? BPCS security is menu/program specific instead of by file.

    OneandOnly0 pointsBadges:
  • Data center security — what advice would you give?

    We've all had our share of "I wish someone would have told me" moments. If you could give advice to someone who is green in data center security, what would be your best piece of advice? What's something you wish someone would have told you early on?

    JennyMack4,280 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following