Security Corner:

March, 2008


March 25, 2008  9:12 PM

You Clicked? Really? Are You Nuts?!

Posted by: Ken Harthun
Anti-virus, Email security, Microsoft Excel, Security, Word

This has to be one of the most evergreen security topics to come along; no matter how much anyone writes about the dangers of clicking on links or opening attachments in unsolicited email, people continue to do it. SANS NewsBites, March 25, 2008,...

March 25, 2008  6:58 PM

Wireless Headset Security Nightmare

Posted by: Ken Harthun
Security, Social Engineering, Wireless

Wireless headsetBeing a Ham Radio operator, I've always understood the risk inherent in using radio signals to transmit sensitive information: anyone with the right equipment can receive and record...

March 24, 2008  9:06 PM

Encrypt, You Must, But Do It Right!

Posted by: Ken Harthun
Cryptography, Data destruction, Encryption, Security, Storage

EncryptionOne of the clients I service has information that falls under HIPAA. Prior to last week, all of the data was stored on a server located behind a strong firewall in a building with good...

March 20, 2008  1:23 AM

Paranoid About Hard Drive Security? Try This

Posted by: Ken Harthun
Data destruction, Encryption, Security

My company serves as the IT department for several medical, legal, social service, and banking organizations in our area. I don't have to tell you that every one of these organizations deals with information that falls under various government data security and privacy acts. Every one of these...

March 12, 2008  2:04 AM

Turn Off Message Preview in Your Email Client

Posted by: Ken Harthun
email, Email security, Security, Security maxim

Some of these tips may very well be "everybody knows" types of things, but I find that these are often the things that get overlooked. That's why I'm publishing them as computer security maxims. Take a look at the recent furor surrounding the

March 9, 2008  3:41 PM

Uncle Sam Wants You–to Become a Cyberspace Warrior

Posted by: Ken Harthun
Cyber warfare, Security

Cyberwarrior A while back, I wrote an article entitled "Will You Be Used As a Weapon Against Your Own Country?" The...

March 8, 2008  6:08 PM

Are You Lazy? Then You Have Security Risks

Posted by: Ken Harthun
Password, Security, Vulnerabilities

True computer and network security takes a lot of work to implement and it takes a lot of work to use. Despite training (if any) and admonitions by their supervisors and the IT Sticky note passworddepartment, the lazy...

March 2, 2008  5:31 PM

Disk Encryption Vulnerable to Cold Boot Attack

Posted by: Ken Harthun
Encryption, Security, Vulnerabilities

According to researchers at Princeton University, it's possible to recover encryption keys from memory for some time after a computer is powered down. Their paper, "Lest We Remember: Cold Boot...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: