InfoSec

Windows Event Log Management Presentation

I recently presented a brief presentation to the Central Alabama ISSA Chapter on Windows Event Forwarding (WEF).  I have a previous blog with a number of resources for getting WEF up and going.  The main point of this presentation was to point out the simplicity of WEF and for people to consider what they are monitoring and is it actually detecting what matters. [slideshare id=84332793&doc=windowseventlogmanagement-171218025835]

Best Practice: Securing Windows Service Accounts and Privileged Access – Part 2

In the first post I covered best practices for securing service accounts.  In this post, I am going to discuss some key elements in securing privileged access.  Keep in mind, Microsoft has published a comprehensive guide to securing an Active Directory. Keep in mind that many of these things will require additional work on the front end, but that is usually due to poor existing practices.  Once processes are in place,… Read More »Best Practice: Securing Windows Service Accounts and Privileged Access – Part 2

Best Practice: Securing Windows Service Accounts and Privileged Access – Part 1

I recently had a client ask me about our recommendations for securing service accounts within Active Directory.   We talked for a bit, and then I decided to write them down.  This post will have two parts, the first part is for Service Accounts and then the second post will be about privileged accounts Best Practice for Securing Privileged Windows Accounts. What is the minimum privilege needed? If the account… Read More »Best Practice: Securing Windows Service Accounts and Privileged Access – Part 1

The Hitlist: Compliance

This post is focused on compliance and cyber security.  What we mean is if your organization is attempting to become compliant to an industry standard or regulation, these are things that will have to be considered and more than likely implemented across the board for things such as PCI-DSS, HIPAA, ISO27k, FISMA and more.  Here is a hitlist for things to consider when planning to meet a compliance standard: 1.… Read More »The Hitlist: Compliance

Heartbleed: What you need to know

Heartbleed is a serious vulnerability that can allow attackers to intercept secure communications.  Email, Websites, VPNs, and other trusted security technologies are at risk – passwords and encryption keys can be breached.  You most likely have something that is affected.  What to do Update anything using OpenSSL, see below for more information. Check to see if you are vulnerable. (Adrian Hayter, a consultant with CNS Hut3, revealed a proof of concept that… Read More »Heartbleed: What you need to know

Study: Cost of Data Breaches Increasing

Cross posted from http://www.securit360.com/blog where I am a regular author. A study published by Ponemon Institute, and sponsored by IBM, purported that the average total cost of data breaches increased 15% in the last year to $3.5 million, or $145 per record containing protected information.  The study included participants from 314 companies in at least 10 countries.  There are a number of key facts that the study shows regarding reduction factors… Read More »Study: Cost of Data Breaches Increasing

Tips for Spotting a Phishing Email

Cross posted from http://www.securit360.com/blog where I am a regular author. Every day users are targeted with phishing emails from all around the world.  These emails can range from overtly “spammy” and easy to detect, to quite sophisticated an difficult to notice.  We have found that this is typically the least defended position in an organization, as well as one of the easiest to exploit.  Even organizations with millions of dollars… Read More »Tips for Spotting a Phishing Email

Verizon Breach Report 2013: What does it mean for your organization?

Cross posted from http://www.securit360.com/blog where I am a regular author. Each year Verizon releases their Breach Report; it is sort of a state of the union with regard to last year’s breaches.  It is worthy research to help determine the industry trends that could help steer the budgets and focus of IT departments.  This year’s report includes 1,367 Confirmed Data Breaches, and 63,437 Security Incidents. No one is immune: [av_image… Read More »Verizon Breach Report 2013: What does it mean for your organization?

The Switch to Chip & Pin: Will it change anything?

Cross posted from http://www.securit360.com/blog where I am a regular author. Chip & PIN, the future of credit cards Late next year the U.S. will finally catch upto the rest of the world when it comes to credit card transactions.  Customers will no longer be signing credit card receipts, instead they will enter a PIN, similar to making a debit transaction.  The U.S. is the last major market to still use… Read More »The Switch to Chip & Pin: Will it change anything?

Password gets the boot, 123456 reigns supreme

Cross posted from http://www.securit360.com/blog where I am a regular author. 2013 crowned a new champion of the #1 password based on passwords collected from data breaches.  The top password for 2012 was ‘password,’ but 2013 announces that ‘123456,’ reigns supreme. SplashData, a security firm, releases their findings each year of the top passwords discovered from breaches.  This year, due to the size of the Adobe breach, you’ll see some Adobe… Read More »Password gets the boot, 123456 reigns supreme