In the “old days” before cloud computing, most organizations used a firewall and everyone understood two areas. First, inside the firewall are your own assets. Then, outside the firewall is the public Internet. This simplistic thinking no longer works....
Many IT departments tell their executives that having multiple firewalls, anti-virus protection, VPN’s, etc. are all you need for security. How does a firewall help you if the attack comes from inside your perimeter? When analyzing your IT security, having several...
When you try more than one monitor, it is hard to go back to a single monitor. Many users move to three or more monitors. What if your laptop, or desktop for that matter, only has one monitor port? Fortunately, if you want to have multiple monitors connected to your...
During a recent IT and physical security audit, we found three wireless access points within a facility that were both: Insecure providing wide open access to whoever wanted to attach and unknown to the IT professionals at the facility. There are many problems with...