Security Corner:

Data


April 30, 2015  8:18 PM

NCIS New Orleans – Smuggling Information

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
computer, Data, PC, Security, Thumb drive

In a plot twist worthy of Back to the Future, X-Men and Mission Impossible, a recent NCIS New Orleans show dealt with data encryption and smuggling and kidnapping. That's not the coolest part. All of it was done using some real terminology and tools - not just movie magic or TV smoke and...

April 30, 2015  8:06 PM

Are You Driving an Easy Target? Car Security.

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Computers, Data, keys, Security

The television show Sherlock got me thinking about automotive security. While lots of folks are moving to cars with keyless entry and key fobs in their pocket and not in the dash, are thieves finding easier technological ways to boost your car?


April 23, 2015  4:59 PM

The Marathon – Tracking the Runners…and the crowd

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, holiday, police, Security, Video

Each year I write…or I should say I have written…a post about the Boston Marathon. For my entire life I have attended the race and the Red Sox baseball game that takes place the morning of the marathon. But this year was different.


March 31, 2015  2:04 PM

Site Hackers – Not a Friendly Bunch, Perhaps

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Blog, Code, Coding, Data, FILES, Hack, Security

My Website is down. I mean crushed and down. Nothing shows up except for a few Greek characters and there's no way I can recover it. I know because I've tried, my hosting service has tried, and I'm not as technically adept as I'd like to be. Instead of wallowing in my despair - as I did enough...


March 30, 2015  1:51 PM

Easier to Break Into Your Company or a Conference Event?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Business, Data, provisioning, Security

It occurred to me at a conference in Louisville that security isn’t an issue specific to businesses. In fact, most businesses are less secure than large conferences because of one simple reason - the staff at conferences are trained to examine the credentials of every person at...


March 23, 2015  4:46 PM

Hillary and Her Phones. Security Faux Pas or Laziness?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Access, Business, BYOD, Data, Device, phone, SECURE, Security, Servers, systems

Hillary Clinton puzzles me. She seems really smart - in the same way her husband/president was smart. But maybe she’s missing that gene that gives some smart people common sense. It’s a theory that the more books you read - and the more degrees you have - the less common sense you...


March 17, 2015  5:33 PM

Home and Business Security Similarities

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Business, Data, home, provisioning, Security

Everyone freaks out because their home might not be secure. They have belongings inside that have value to a thief - and of course them. And keeping the actual property locked up and safe is the struggle they face on a regular basis.

It’s similar...


February 28, 2015  4:13 PM

Security – How Much is Too Much; How Much is Too Little?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
ATM, Data, Infosec, Security, social media

I’m regularly baffled by the incongruous nature of security in this country. We seemingly don’t have a set of standards - or even common sense - when it comes to locking down our valuable data assets and letting others remain accessible.

The...


February 28, 2015  3:27 PM

Chatting about Security

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
chat, Data, Disaster Recovery, ITKE, Security, twitter

As you've probably noticed, we've been putting on a regular #ITKESecurity Twitter chat about once a month. The goal of the chat is to answer some of the questions you might have regarding security issues.


February 28, 2015  3:18 PM

Chips, Pins and Intrusive Medical Procedures

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Access, Data, id, Security

When you read about someone getting pins in their body, you immediately think about a broken bone and the procedure needed to repair it. In the medical field, we’re now hearing about pins in another way…as a security device.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: