Cross posted from http://www.securit360.com/blog where I am a regular author. A study published by Ponemon Institute, and sponsored by IBM, purported that the average total cost of data breaches increased 15% in the last year to $3.5 million, or $145 per record containing protected information. The study included participants from 314 companies in at least 10 countries. There are a number of key facts that the study shows regarding reduction factors… Read More »Study: Cost of Data Breaches Increasing
Cross posted from http://www.securit360.com/blog where I am a regular author. Every day users are targeted with phishing emails from all around the world. These emails can range from overtly “spammy” and easy to detect, to quite sophisticated an difficult to notice. We have found that this is typically the least defended position in an organization, as well as one of the easiest to exploit. Even organizations with millions of dollars… Read More »Tips for Spotting a Phishing Email
Cross posted from http://www.securit360.com/blog where I am a regular author. Each year Verizon releases their Breach Report; it is sort of a state of the union with regard to last year’s breaches. It is worthy research to help determine the industry trends that could help steer the budgets and focus of IT departments. This year’s report includes 1,367 Confirmed Data Breaches, and 63,437 Security Incidents. No one is immune: [av_image… Read More »Verizon Breach Report 2013: What does it mean for your organization?
Cross posted from http://www.securit360.com/blog where I am a regular author. Chip & PIN, the future of credit cards Late next year the U.S. will finally catch upto the rest of the world when it comes to credit card transactions. Customers will no longer be signing credit card receipts, instead they will enter a PIN, similar to making a debit transaction. The U.S. is the last major market to still use… Read More »The Switch to Chip & Pin: Will it change anything?
Cross posted from http://www.securit360.com/blog where I am a regular author. 2013 crowned a new champion of the #1 password based on passwords collected from data breaches. The top password for 2012 was ‘password,’ but 2013 announces that ‘123456,’ reigns supreme. SplashData, a security firm, releases their findings each year of the top passwords discovered from breaches. This year, due to the size of the Adobe breach, you’ll see some Adobe… Read More »Password gets the boot, 123456 reigns supreme
Cross posted from http://www.securit360.com/blog where I am a regular author. Updated: Originally posted by the WSJ, and sourced here from Business Insider, Target had warning last spring about a new emerging threat against POS systems. Internal analysts requested additional scrutiny. Updated: According to an article posted on Krebsonsecurity “the initial intrusion into its systems was traced back to network credentials that were stolen from a third party vendor.” The recent retail… Read More »Target Data Breach Timeline
As part of a recent project, I needed to create a dashboard page for the requests for executive management. However, since the data was in a list and not a database this was easier said than done. So I started off by researching my options and I found this post on MSDN. This post explains very well how to modify the XSL of a DVWP to create a bar graph.… Read More »Vertical Bar Graph with XSLT in Data View Web Part (DVWP)
I have been managing a project to develop a simple app to upload files to a web server. In order to do this with the way we were managing state, we had to temporarily store the file on the server until submit. This posed a problem with files that were put in temp, but then the browser closed. Since the browser closed didn’t cleanup the file I had to write… Read More »Powershell Delete Files After X Days and Keep Log
I have recently been working on a project the deals heavily with XSLT and DVWPs. One thing to keep in mind is that data manipulation done in XSLT is done client side and thus slows load times. This is especially the case if you are just the equivalent of a SELECT * in your CAML query as the entire dataset is returned and then it is up to the client… Read More »Example CAML queries for SharePoint Designer
–Updated 2/2/2011 Added a few additional reference links at the end. –Updated 1/18/2011 Added Windows Server 2008 External Connector to licensing lists for public facing sites. I have tried to compile a list of sources to help simplify (or least consolidate) information on SharePoint 2010 Licensing. This is a good reference for what is/is not included in the different versions of SharePoint: http://goo.gl/HWasj Visual breakdown of the basic requirements of a… Read More »SharePoint 2010 Licensing Quick Reference