Weekly Tech Tidbit – Doing Public/BYOD Wireless The Right Way

Bob and I have discussed over and over the need for improved public wireless configuration.   Some of you have gotten the message.  Sadly many have not.  As we approach the summer, let’s get this fixed once and for all. Here are a few design changes many of you need to implement: If your endpoints in […]

Read more

Weekly Tech Tidbit – External Vulnerability Scans

Do you know how secure you are from the outside world?  Maybe you’re new and inherited a network, or there has been so much churn over the years with servers being added and retired and software previously available in-house now being hosted?   Maybe you have just lost track of patching? Regardless of the reason, a […]

Read more

Weekly Tech Tidbit – Cisco Firepower IPS Intrusion Event refresher   

This tidbit is a refresher on looking at Cisco Firepower Intrusion Event logs and daily reports. Specifically, I wanted to review for all of you again the meaning of two key columns, the Impact and Inline Result columns The Firepower Impact scale is designed to help the recipient understand where to focus scarce resources first.

Read more

Weekly Tech Tidbit – Secure your DNS

Keeping up with my theme on DNS related posts, this week I will again reprise a post from over a year ago on the importance of implementing proper control of DNS as part of your malware protection program.   It remains as valuable part of your overall all network and security management policies.

Read more

CSI Tech Talk Webinar – China Hacking Update – Recording Availabile

The US-CERT (Computer Emergency Response Team) recently gave a presentation on what China has been doing to hack anything they can hack with the goal of stealing intellectual property, money and personally identifiable information. While most public sector schools and government agencies are generally not vast repositories of intellectual property, they do manage and transfer […]

Read more

Weekly Tech Tidbit – The FBI Came To Visit…

The FBI came to visit us last week.  No it wasn’t an investigation.  It was for CSI’s 3rd annual Security Event.  I have talked about the topic of Cyber Threats in person and on-line, but our Supervisory Special Agent had a few interesting things to say beyond the topics Bob and I have been discussing […]

Read more