Is Windows Firewall enough protection?

Is Windows Firewall enough protection?

Windows versions from XP onward include a built in firewall. But is Windows Firewall enough protection?

Yes. And no. Security answers are almost always complicated. But I’ll explain.

Read more

Watering hole attack prevention

Watering hole attack prevention

A watering hole attack is an indirect attack on a victim. Rather than directly attacking the victim’s network, the attacker attacks a web site that the victim’s employees are likely to visit. Then the attacker attacks the victim’s network, via its own workstations, from that web site. A former colleague asked me how you protect against watering hole attacks, and I thought this was a good exercise. So here are some strategies for watering hole attack prevention.

Read more

The meaning of superseded patches

One of my clients asked me to explain superseded patches and how they relate to vulnerability management and patch management. This is a common question about a common complaint. Knowing the meaning of superseded patches and how to handle them is absolutely critical for running a successful security program.

Read more

Vulnerability scanning best practices

As a vulnerability management professional, I talk about vulnerability scanning best practices a lot. There’s a lot more to vulnerability management than just scanning, but if you don’t get scanning right, the rest of the program suffers.

I’m going to talk about a lot of technical controls here, but don’t forget the nontechnical side. People and processes have to support all technology.

Read more

Chip won’t work on your credit card? Try this.

Chip won’t work on your credit card? Try this.

If you’re standing at a checkout and the chip won’t work on your credit card, don’t give up right away. Here’s what to do when you swipe but can’t complete your purchase because of a debit or credit card chip not working. I’ll also tell you how to clean the chip on your credit card so it’s less likely to give you a problem again.

Your options include swiping, then inserting the chip and repeating three times. Some merchants allow this. Another option is cleaning the chip on the spot, which you can do by rubbing the chip with a dollar bill. If the chip is just dirty, which is the most common problem, this will usually clean it enough that it will work, even if it gets you funny looks.

Chips are a new security feature to reduce fraud, but it’s hard to appreciate them when a broken chip keeps you from completing your purchase. It happened to a longtime friend, and another friend of his provided a solution. I had to share it, because I know it will happen to others.

Read more

Common security attacks and countermeasures

As a security professional, I talk to a lot of people about common security attacks and countermeasures. I’m not always certain the people I’m talking to know what these things mean. I am almost certain they aren’t willing to ask.

I know it’s more complicated than it was when I took my Security+ exam a decade ago. The stakes are much higher now. The attacks I had to identify caused inconvenience, but someone conducting a successful smurf attack on your printer won’t get you in the headlines. Today’s attacks will.

Read more

How does MAC address filtering help to secure a wireless network?

Someone asked me the other day how does MAC address filtering help to secure a wireless network? If you’re in a position where it would help, I argue there are other things you need to do. But I’ll explain how it works, then what I’d rather you do instead.

Read more

What to look for in a USB flash drive

What to look for in a USB flash drive

USB flash drives are pretty much a necessity these days. They’re far more convenient for moving files around than optical discs, and they make good backup devices. But not all USB flash drives are created equal. Here’s what to look for in a USB flash drive.

Here’s a tip: I don’t just use USB flash drives for transporting data and backups. I like to keep a modest-sized USB flash drive plugged into my router, turning it into a small NAS. It gives me a convenient, reliable place to back up data from any of my computers.

Read more

Skycure: a review

Skycure helps keep your Android devices secure. A coworker who came up through the mobile space recommended I check out Skycure. I liked it right away. This is my Skycure review for Android.

Read more

Patch management strategy

Vulnerability management and patch management are close relatives. In most companies, think of them as siblings who hate each other. That’s usually how it plays out. It doesn’t always have to be that way, but it takes some thought and strategy from both sides. Here are some ideas for patch management strategy.

Read more