Deploying a password management solution would indeed be the best start towards information security this festive season! 2012 is fast drawing to a close. While looking ahead for a great holiday season and a wonderful New Year 2013, we just looked back and reflected on the year just gone by. 2012 had been fabulous in many counts, but when it comes to information security, it had indeed been a year of high profile security breaches and identity thefts across the globe. Individual users and mighty enterprises alike have fallen prey to hackers.
BYOD: Boon or bane for enterprises?
BYOD … is the most used word you can find in articles and tech journals. Why BYOD has become the buzz word? Let us take a look into the underlying merits and demerits of BYOD
High Profile Cyber-Security Breaches in Australia – You Might Be The Next Victim!
(Originally published in CSO, Australia ) Australian media is agog about the stories of hacking by the hacktivist group ‘Anonymous’, the group that defaced several Australian websites also claimed stealing user credentials and contact information from Australian Pizza Hut, early this month. In fact, the month of November has been a period of high profile security breaches and identity thefts not just in Australia, but also across the globe. Seeing some of the world’s mightiest enterprises falling prey to hackers is no longer uncommon given the current trend
Cyber Monday Lessons: Apple Can Get Away with Outdated Mobile Sites…But You Can’t
Yesterday, I connected to Apple’s w e bsite on my iPhone, only to discover that the undisputed leader of all things mobile didn’t have a mobile-friendly website. Well to be fair, Apple does offer a native app for purchases on its Apple Store, but it’s ironic, isn’t it? Especially considering Apple helped to usher in the mobile craze dominating this week’s Cyber Monday stories.
Tabs and Session Management for free CMD Prompt Remote Tool – DameWare SSH Client for Windows
Get the free SSH client here: www.dameware.com Learn how easy the DameWare SSH Client for Windows is to use and how to improve session management through the use of tabs in this great free CMD Prompt tool. Connect to devices and computers using SSH1, SSH2, or Telnet from the DameWare SSH Client’s easy-to-use interface.
UTM 9.004 Up2Date Released
We have just uploaded released UTM 9.004. This main reason for this release is to support our new UTM 100 product and its associated licensing, and we'll also take the opportunity to increase the stability of UTM 9 by quashing a few bugs, notably a pesky one with IOS6 and the Cisco VPN client which we support. IOS6 should again work with your UTM VPN configurations.
Guest Blog : ServiceDesk Plus – An Evolution
When I started at my current employer, help desk requests were handled by a shared e-mail box.
Redundant OSPF routing over IPsec VPN
With this video, you’re going to learn how to set up an OSPF VPN connection, creating a redundant secure connection between two FortiGate units. By using OSPF on the IPsec interface, you can better control VPN traffic and have secure redundancies easily built into the network structure. This example shows a simple 2-site redundant IPsec setup
Guest Blog : Helping yourself to IT support
The changing face of the Service Desk The role of the traditional service desk has been to provide a centralised and consistent function to help resolve issues, problems and fulfil requests. However the role and face of a modern service desk is changing. We see an increasing trend across many organisations for users to become more self-sufficient
How about deploying a surveillance camera for Windows RDP, Telnet, SSH session actions?
Nowadays, enterprises of all sizes and types rely on surveillance cameras for physical security of their premises. With cyber-crimes looming large, effectively securing sensitive data has emerged a big challenge for all organizations – enterprises, government agencies and military establishments. Of late, internal threats seem to be far more alarming as many of the reported security incidents have been caused by trusted third-parties and malicious insiders having authorized or unauthorized privileged access to the IT resources.