Security Corner:

January, 2013


January 31, 2013  2:31 AM

Physical security: Implementing a card access system

Posted by: Ken Harthun
Security, Security best practice, Security management

At the college where I work,...

January 31, 2013  1:26 AM

Video: How to explain phishing to your Grandma

Posted by: Ken Harthun
Malware, Secure Computing, Security

Catchy title, but the video really doesn't explain. The Sophos Threatsaurus, however, does a wonderful job of explaining all kinds of malware to everyone. I have a copy and keep it handy on my desk. I suggest you do, too. It's still a catchy video, especially for those who love British...

January 30, 2013  12:39 AM

All your secret are belong to us

Posted by: Ken Harthun
Password, Security, Security best practice

The eight-character...

January 20, 2013  5:08 PM

Simple password tip to create unguessable passwords

Posted by: Ken Harthun
Password, Secure Computing, Security, Security best practice

Bookmark and Share     0 Comments     RSS Feed     Email a friend

January 19, 2013  4:17 PM

Who really needs anti-virus software?

Posted by: Ken Harthun
Anti-malware, Anti-virus, Security, Security best practice

Every list of best security practices contains an admonition to run anti-virus and/or anti-malware software. I have certainly been one to push such things over the years and have tested and recommended most of the popular contenders. But I got tired of the performance problems, the updates, the...

January 15, 2013  1:14 AM

Renegade executives can wreck security

Posted by: Ken Harthun
Secure Computing, Security, Security best practice, Security management

Bookmark and Share     1 Comment     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: