**UPDATE** October 12, 2017 Microsoft has now released an update to their earlier announcement. They have clarified that, as of October 31, RPC over HTTP will no longer be supported on Office 365, but the protocol will not actually be...
Category: Best Practices
Hardware Firewall for USB Devices
This is one of the best low-cost security products to come along in a long time. Here's why. A few years ago, I attended a security conference sponsored by Ingram Micro (a large distributor of technology products, for those of...
SSL and Certificates – Part 4 of 3
Yes, it's time to add on another post about SSL certificates. I suppose I could have gone back through all of the posts and corrected the titles to "Part x of 4," But, in the spirit of Douglas Adams, whose...
Tips for Securing an IoT Deployment
Hard on the heels of updating my earlier post about the Internet of Things (IoT), I came across another post on ZDnet entitled "How to Secure Your IoT Deployment in 10 Steps," that was published a few days ago. While...
Change the Damned Passwords!
According to a post today on ZDnet, a team of researchers from Trend Micro revealed, at the RSA conference in San Francisco, that there are more than 178 million IoT devices visible to the Internet in the ten largest U.S....
What’s Wrong with SMS Authentication?
Back at the end of July, quite a bit of media buzz was generated by reports that the NIST was recommending, in the draft of their new publication addressing digital authentication methods, that using SMS text messages as a second...
Using File Sync & Share to Help Fight Ransomware
We’ve written a lot about security in general and ransomware in particular, because your security is a major concern to us - and we hope your own organization’s security is a major concern to you as well – and because...
ESET Adds Data Leakage Protection
ESET recently announced the addition of Safetica Data Loss Prevention (“DLP”) products to its Technology Partner Alliance. These are tools that are designed to prevent the accidental (or intentional) transmission or leakage of sensitive data outside the enterprise network. If...
Beating Malware by Disrupting Command and Control
One of the key strategies in modern warfare is disrupting the enemy’s command & control infrastructure. It can also be an effective strategy in the ongoing war against malware. One of the first things that usually happens when a PC...
ESET Introduces Hardware-Encrypted USB Drive
It seems that data security is a never-ending battle, and it has become obvious that we need multiple layers of protection to deal with the proliferation and constant evolution of security threats. Today’s security topic is the ubiquitous USB “thumb...