Healthcare data at risk

It is only a matter of time before health data will be plastered all over the Internet. A number of Blogs are discussing this very issue http://www.safelogic.com/exposing-the-risks-of-data-driven-healthcare/ is one.   Penetration testing for New England care solved some problems outside of security issues: http://www.coresecurity.com/content/penetration-testing-key-to-hipaa-compliance-for-care Penetration testing checks the boundaries of your computer systems. By using open source tools … Read more

SPOE – Second Pair of Eyes

When is it necessary?  when entering an important command into a critical system that affects thousands of users. Or when you have to review your network to make sure no holes are found. the attacks on your network are relentless: Bad hackers  will attack your network and own your machines.   Once they own your machines … Read more

Manage a website?

On the Internet if you manage a website then you should update the system in such a manner so that it should not get hacked. If the machine gets hacked you may inadvertently attack other systems.  Hackers are looking for systems to control (owning or p0wned) How are you certain that your IT department is … Read more

Good Time to Evaluate Patch Management

Interesting to note tomorrow is 2 weeks from Patch Tuesday November 11th (2nd Tuesday of month) and 2 weeks from patch Tuesday in December (the 9th). So it is a perfect time for reflection – thus we review a discussion of the November 2014 patch Tuesday  in SecurityWeek. It means to give direction for companies that … Read more