VLAN Hopping Defeats Segmentation
When we set up a Network we segment the network. The firewall protects the inside network, and the inside network critical systems are separated from the rest of the devices.…
Defend Your Systems
When we set up a Network we segment the network. The firewall protects the inside network, and the inside network critical systems are separated from the rest of the devices.…
If set up correctly your Firewall logs will tell you what is most important about your network, your employees, any trojans or viruses that are running in your network, etc.…
As other blog posts have mentioned in the past: Schneier: https://www.schneier.com/blog/archives/2013/01/people_process.html http://www.computerweekly.com/blogs/david_lacey/2013/01/we_need_more_use_of_security_t.html Here is the “Security Triangle” People, Process, and Technology. Image from: http://www.business2community.com/online-communities/social-intranets-merging-people-process-and-technology-0126252 Even though the image above is…
We are talking IT security risk – not financial or other security. IT security Risk – How to define it? Colors Green, Yellow, Orange, Red ? Numbers 12345 , or…
If the weakest link in Security or the equal parts of security : People, Process, and Technology, then we need to help the people in your organization with keeping up…