So, “Peggy” from “Computer Maintenance Department” called me again last night. This time I decided to mess with him a bit more. This is the second time. (No, “Peggy” wasn’t his real name, nor did he identify himself as “Peggy,” but that’s the name I’ll use, thanks to that old Discover commercial.)
Sometimes the best place to look for new talent is inside the team you already have, writes Infoworld’s Dan Tynan. Then he gives seven ways to find them.
One of my coworkers invited me to watch a webinar with him today that promised to compare CompTIA’s new high-end certification with the CISSP. I was skeptical at first, especially when I heard it was an 80-question, 150-minute test. But by the end, I mostly liked what I heard.
I overheard a couple of people talking a few weeks ago, and one said, flat out, “Certifications are a scam!” As one who has two security certifications (Security+ and CISSP), I disagree. Now that I’ve had my first post-CISSP professional review, I disagree even more strongly.
On Wednesday evening, I wrote about basic computer security from a Windows-centric perspective. I knew some people who needed help in a hurry, and given there was a 90% or so chance they were running Windows, I took that route. Some of my buddies who use Macs passed it along. And much of what I [...]
I wish I had a nickel for every time I’ve heard an unsubstantiated statement like “Windows firewall is junk.” I went looking, and the best I could find was this, an editorial that said it doesn’t do enough to address outbound connections, particularly on a program-by-program basis. OK, point taken. But “enough” is a moving [...]
I’m a security professional by trade, with two certifications. I’m not responsible for defending your computer networks, but I want your networks to be secure. There’s a really simple reason for that. If your computer and your network is secure, then it isn’t attacking mine. Or anyone else’s. Several fellow subscribers to a train-related interest [...]
The so-called wi-fi golden era is over, and apparently being glad about it makes me an absolutist. But John C. Dvorak is wrong. This isn’t about making people pay for Internet access. It’s pure security. Toilets and drinking fountains are free because the majority of people don’t abuse them. The Internet can’t be wide open [...]
I read this week that 61% of Adobe Reader installations in workplaces is out of date. That’s very bad. Very, very bad. Because Adobe Reader is trivially easy to exploit, and there’s more sensitive information to steal on corporate PCs than there is on home PCs.