Alex and Steve,
I would not do what Alex recommends. You cannot go in like a commando and
start changing everyone os, desktop configuration, apply dhcp/dns, without
doing an impact analysis on current application and LAN connectivity
requirements the current users have. The last thing you want t
Debbie,
It is very important that you are not the only person approving security
changes. The network and firewall people should also approve and signoff on
all changes. You need to make sure that eveyone knows that you are not the
owner of *security*..the user/network/administrators are. Be ca
Hi,
What are the specific IT security requirements for the Sarbanes-Oxley Act?
Based upon the limited research I have conducted (google) it seems that most
requirements fall in the records management area (i.e. email, data retention,
etc) and protecting computer data from manipulation/destructio
Folks
We have an outside vendor (StellarRAD) that wants to come into our network (via
VPN) and use pcAnywhere to maintain his software on 5 production servers.
Vendor wants to also use a product like Blue Ocean to remotely control our
workstations to help users with software problems (ie software
We are starting to use gotomypc as a replacement for our checkpoint vpn. See
article:
http://www.nwfusion.com/net.worker/columnists/2001/0820kistner.html
--- Marty <[EMAIL PROTECTED]> wrote:
> Hi,
>
> I remember inquiring last year about VNC as a network remote control
> solution. Sincere th
Hi,
Anybody know of a good IDS Managed Service Organization that they could
recommend to me? Our current security staff is just too small and overwelmed
with other security projects to install/monitor/followup on IDS findings. We
also lack the technical expertise to do this.
My budget is in the
Rodel,
Not a good idea especially if the employee works in mission critical postion
(ie systems administrators, firewall, network, etc). Opens the door to various
social engineering attacks " ehhh...I need to get some information but Bob is
not here today...".
Another way to look at it is...wh
Mike,
If you want to know the best cert's to go after..go to monster.com (or some
other job site) and do a keyword search on cisa or cissp. You will get a ton
of security jobs that require a cisa and/or cissp. The problem with the cert's
the poster mentioned below (ie Security+, A+, Neetcrk+, et
Mike
Best two to go after are the CISSP and the CISA.
--- "Phillips, Mike" <[EMAIL PROTECTED]> wrote:
> Please accept my apologies if this is not the appropriate forum for this
> question..
>
> I am researching the relative value of various professional certifications
> in the IT field
I was doing security research on the internet at work yesterdaywhen all of
a sudden I got a pop up advertisement that stated that I was broadcasting my IP
address to the entire internet. It then showed a screen with my IP address
which was the the external IP interface of one of our companies
Hi,
Our firewall group has came to me several times over the last few months
wanting my approval to open all of the “OUTBOUND” ports on our firewall facing
the internet. Their argument is that this would not significantly reduce our
security and it will reduce their time/effort in administration
11 matches
Mail list logo