The Lost Art of Physical Security

Posted by Josh on August 26, 2012 in Security |

  When you read about IT security, you see lots of hype about Operating System security, application security and various types of encryption.  What is often left out is the concept of physical security. You might ask what physical security is and it is a good question!  Physical security, as it applies to Information Technology, […]

Tags: , , , , , , , , , , ,


Own the Email, Own the Person

Posted by Josh on August 21, 2012 in Security |

This article by Dennis Fisher is a great piggy back on my Password Security  and Social Engineering articles. For attackers looking to take control of a victim’s online presence, there is no better place to start than the target’s email account. If you own the email, you own the person. That’s never been more true than today, with […]

Tags: , ,


Everybody Lies…

Posted by Josh on August 20, 2012 in Security |

  To quote the famous TV doctor Gregory House, “everybody lies”.  Why do I say that, I do not know a single person that actually reads the whole end-user license agreement (EULA) on software products they buy.  They are those things that everyone clicks “ok” to after scrolling through what seems like 100 pages of […]

Tags: , , , , , , , , , ,


The Mobile Device Dilemma

Posted by Josh on August 13, 2012 in Security |

Within the US particularly and most “first world” countries, we live in societies of “always on” and “always connected” for both personal and our professional lives.  While this 24×7 connection allows for greater productivity and hyper-connectivity, it is not without its own pitfalls.    From both a personal and professional standpoint we must take a […]

Tags: , , , , , , , , , , , , , ,


Certification vs. Experience vs. Degree

Posted by Josh on August 8, 2012 in Review, Security |

Something that comes up often both when organizations are looking to hire a new IT professional as well as within the circle of IT pro’s themselves is how do certifications, experience and an IT related degree stack up against each other.   Long time IT folks tend to have the view that experience trumps and often […]


The WiFi threat is real

Posted by Josh on August 5, 2012 in Security |

One of the most common threats to a computer user’s security is something that has been widely adopted by businesses and home users alike.  Wireless internet connections, also known as Wi-Fi, has made connecting you computing devices to the internet easier in a wide range of locations.  The same technology that allows you to connect […]

Tags: , , ,


Social Engineering….Your IT’s biggest threat?

Posted by Josh on July 23, 2012 in Security |

  Social engineering has slipped to the way side a bit when people think of IT security.   A focus on patch management, packet inspecting, IDS/IPS, and the like taking the main stage, leaving social engineering as a back burner project. Social engineering has evolved from the old movie staples of “dumpster diving” to flashy websites […]

Tags: , , , ,


Password Security

Posted by Josh on July 12, 2012 in Security |

With the recent password leaks from both LinkedIn.com and Yahoo.com, the topic of passwords has been at the forefront of many citizens and specifically IT departments.  It is not uncommon to walk in to an office environment and see things like passwords taped to monitors or hidden on sticky notes under mouse pads, keyboards, and […]

Tags: , ,


PKard Smart Card Reader

Posted by Josh on July 8, 2012 in Review, Security |

After about a month of testing Thursby’s PKard Smart Card Reader for iOS devices, I am happy to say I am rather impressed.  The interface is smooth and clean, with only some minor glitches one would expect in v1.0 software.    The two major functions that I use is the ability to CAC authentic to Outlook […]

Tags: , , , , ,

Copyright © 2012-2019 All rights reserved.