Jeff Cutler's Keys to Security:

Security


August 19, 2014  3:37 PM

Healthy Respect for Security – Medical Data Breaches

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Hack, Healthcare, Security, Stolen data

One of the hats I wore before jumping into my role as freelance writer was as an employee of a rehabilitation facility. This rehab - for physical injuries and ailments - was a small player in the huge sea of hospitals and provider companies. To that end, their systems were hardly interconnected,...

August 13, 2014  3:19 PM

The Broken Car Window – Keep Your Valuables Out of Sight

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, duplicate, IT, Permissions, Sandbox, Security, Server, Uncategorized, visual

Like many readers, I live and work near a major metropolitan area. Crime is on our minds more as a way of life as opposed to a life-trajectory-affecting force. Therefore, the issue of car break-ins isn't one we focus on. City dwellers just know to keep valuables out of sight.


August 5, 2014  9:32 PM

Bad Security in One Area is Bad Security in All Areas

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Accounts payable, CEO, CIO, CTO, Finance, IT, Security, Uncategorized

Guess what has two thumbs and just got a check for a project he finished? Oh, yes. This guy. Bookmark and Share     2 Comments     RSS Feed     Email a friend


July 30, 2014  4:19 PM

IE no more secure than an unlocked car

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
CTO, Hack, Hackers, Internet Explorer, IT, Security, Software

My MINI Cooper is parked in a garage. In the car is a pile of coins that if counted would amount to $34, probably. That’s why I locked the doors, hid the coins, parked in sight of the lot attendant and ensured that nothing else of value was in view of passersby.

Paranoid? Maybe....


July 23, 2014  4:58 PM

Chips no longer an option for protecting credit cards? What!?

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Data-security, protection, Security

I’m all for technology being incorporated into our lives. We use so many online networks to stay in touch with friends, colleagues and even the businesses with whom we interact. But the cost of sharing information with these audiences is often worth the payoff. ROI of sharing is...


July 16, 2014  3:30 PM

Controlling your IT Assets – Learn from the Supermoon

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
CIO, CTO, Data, IT, keys, Security

The Supermoon the other night got me thinking, “with great size comes great responsibility.” While reworked from a Spiderman comic book quote, it’s a saying that rings true when you’re thinking about online presence and how you can best control your image, assets and...


July 8, 2014  1:42 PM

Keeping Your Data (and other) Doors Locked

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
admin, Data, DDOS, doors, IT, keys, Security

The house next to mine is being broken into as I write this. Seriously. Some guy with a ladder walked around the entire house and then chose a window to enter through and set up the ladder and started to climb. Only when I emerged from my house - after taking photos of him and his...


July 2, 2014  2:37 PM

Beginning of Summer Security News Roundup

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data breach, Email, IT security, malware, Microsoft, Security

Sometimes the daily grind of log management, provisioning personnel and staying on top of IT security issues is just too much. You need a break to relax by the pool and sip an iced tea in the summer sunshine. Well, don't we all. That's not reality though. Without careful and constant vigilance,...


June 25, 2014  12:51 PM

The Importance of IDs and Provisioning

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Data, Facilities, provisioning, Security

One of my regular soapbox topics is the ease with which facilities can be breached. And if you can get in the door of an organization, it's relatively easy to get into doors within the building and wreak havoc with systems, data, physical and intellectual property and the livelihood of the...


June 18, 2014  2:33 PM

What to expect – the Keys to Jeff Cutler’s Keys to Security

Jeff Cutler Jeff Cutler Profile: Jeff Cutler
Blog, Data, IT, Security

I'm not sure I ever did a 'welcome' to the blog post when I first started working for Tech Target and putting my columns on security, data breaches, log management and more out into the ether. This post serves that purpose. I want to say hi, introduce myself a bit more, ask you some questions and...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: