During this year’s RSA Conference, security experts Ed Skoudis and Johannes Ullrich detailed how everything from an industrial control system to big financial institutions are vulnerable to a widespread cyber kinetic attack. Skoudis also expressed concerns that society continues to ignore the risks of these types of attacks. Do you think we’re prepared for a [...]
Answer Question | March 18, 2013 2:18 PM
With the transition to cloud email services like Gmail or Office 365, IT departments are facing new security issues. Has your company considered sandboxing your email client to lessen such security risks?
Answer Question | March 18, 2013 2:05 PM
Cloud Security, Cloud Services, Sandboxing, Security
Along with former president Bill Clinton’s keynote address, security will be headlining at HIMSS 2013. With healthcare being the most breached industry in 2011, experts will look at the various ways they can address the many risks. What steps should the industry take to lessen the risks of security breaches?
Answer Question | March 11, 2013 7:39 PM
I have Norton for three computers and want to take it off one of them and put it on a new computer? Can I do this?
Answer Question | March 4, 2013 12:35 PM
What exactly is cyber-squatting?
Answer Question | March 1, 2013 9:03 PM
I have 1TB external HDD. I want to know if it is possible to install any antivirus in my external hard drive because I might plug it in another computer that doesn’t have an update and that has a virus. Which one is good antivirus for external hard drive?
Answer Question | February 27, 2013 1:14 PM
Antivirus, HDD, Security
Good evening folks, recently I have tested out a risk management software tool and was wondering if there are any more?
Answer Question | February 27, 2013 9:58 PM
I forgot my password and my email address had been disconnected. How do I get my pass code?
Answer Question | February 26, 2013 9:03 PM
Email account, Password
When I use skype, my calls are often REDIRECTED to someone else. This happens when I make Skype-to-Skype calls, and also when I make Skype-to-phone calls. They also spoof the id’s of my contacts to make Skype-to-Skype calls to harass me. How do they do this? How can I stop them?
Answer Question | February 25, 2013 8:21 PM
How to design network security architecture efficiently?
Answer Question | February 25, 2013 12:46 PM
Security, Security Architecture
As BYOD becomes more prevalent, some companies have turned to identity management systems to safeguard data and employees. Are you aware of identity management systems? Has your company adopted such software tools?
Answer Question | March 5, 2013 8:08 PM
BYOD, Identity management, Security
Someone was “helping me out” by loading the Wi-Fi printer info on my laptop. When the USB key was inserted, it extracted information from my laptop first, very fast. Then it downloaded the printer program and asked for set-up. I am highly suspicious as to why the the USB key didn’t, upon insertion, have me [...]
Answer Question | February 19, 2013 1:36 PM
Printer, Security, USB devices
We are trying to get into our portal on the Deepwater horizon site. I have asked and received confirmation for a new password and login i.d. 3 times. They sent me a confirmation of my password but when we tried to login, it ask for the information to establish a claimant. When we filled this [...]
Answer Question | February 18, 2013 3:43 PM
Login password, Password management
I want to shield one room against EMF emitted by the computers from escaping the room. This is for security of the data, not some crazy health craze. Will a simple faradays cage suffice? Should I ground the cage? What about the power lines and LAN lines and phone lines that could potentially emit signal [...]
Answer Question | February 18, 2013 7:46 AM
Security, Security management
President Obama issued his long awaited Cybersecurity executive order which is aimed at improving public-private information sharing. However, many skeptics believe this order won’t get anything done. Do you think Obama’s executive order will go through? What impact will it have on the Cybersecurity industry?
Answer Question | February 26, 2013 7:46 PM
I have a compliance requirement to convert all FTP jobs to SFTP. However SFTP does not work on Windows 2008 server the same way it works in Unix or AS400. In windows 2008 server, when you send a file via SFTP, it can only place it on local hard drive of that server. Currently, our [...]
Answer Question | February 15, 2013 6:20 AM
AS/400, AS/400 administration, SFTP
Is it possible to use the same SSL certificate in different Windows Server. I have an URL (abc.mydomain.com) it is configured in two web servers. These two web servers are hosted in different windows server. In such cases, how may certificates should I order?
Answer Question | February 28, 2013 6:03 AM
SSL certificate, Windows Server
What are the ten advantages and disadvantages of biometrics in information technology?
Answer Question | February 11, 2013 9:19 AM
Why can’t I download AVG? I keep getting the message “could not delete keysoftwareavgavg2013″.
Answer Question | February 11, 2013 1:32 AM
AVG, AVG installation
An AOL person says that my personal computer has been hacked by someone in Afghanistan; how can he tell?
Answer Question | February 7, 2013 8:34 PM