Tag: Tim Trow

Young businessman explaining data to colleague at meeting

Plans are nothing; planning is everything

I think Eisenhower said it best when it comes to plans and planning. I think this also holds true for Business Continuity and Disaster Recovery planning. Without a proper process in place to support the organization in the event of some manmade...

/ October 17, 2011
Portrait of beautiful young woman using laptop while holding credit card at home

Has it really come down to a bag of chips?

A recent vending machine company had some of its POS systems compromised at waterparks in Wisconsin and Tennessee. This was a major breach…up to 40,000! Go figure. People can’t even buy some snacks or what not from a vending machine without having...

/ September 20, 2011
Too Extreme I dont think so. Tying security to compensation

Too Extreme? I don’t think so. Tying security to compensation.

A colleague of mine recently posted a blog about the Black Hats getting the job done and rightfully so. Hackers have been pillaging the countryside lately. How many company compromises have there been over the last 3 months? More than there should...

/ August 8, 2011
Closeup of photographer man holding and looking through circular polarizer filter

Keep living in a fantasy world…

It will never happen to us. We know what we are doing. We are too small to be a target. Besides, we have a firewall, intrusion detection system and some really talented people in place to protect us from these so-called hackers....

/ July 11, 2011
The Softer Side of Information Security

The Softer Side of Information Security…

I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

/ June 30, 2011
Group of Multi Ethnic Corporate People Having a Meeting

You can outsource the work, but not the responsibility

Many organizations are under the impression that if they outsource their credit card transactions, then they are not responsible for their PCI compliance. While this may minimize the scope of the PCI environment, it does not alleviate the responsibility for their PCI...

/ February 21, 2011
P3 Cubed - Focus on the Basics Part III

P3 Cubed: Focus on the Basics Part III

From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...

/ January 21, 2011
P3 Cubed - Focus on the Basics Part II

P3 Cubed: Focus on the Basics Part II

Continuing from the previous discussion on the most significant areas of technical concern in the area of information security and assurance and the three P’s – Passwords, Patching and Ports, let’s talk next about Patching. 

/ January 21, 2011
P3 Cubed - Focus on the Basics

P3 Cubed: Focus on the Basics

One of the most significant areas of technical concern in the area of information security and assurance is what we have come to call the three P’s – Passwords, Patching and Ports.? Default and weak passwords continue to impact organizations, especially on...

/ January 1, 2011
1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...