Microsoft Cloud – New Security tools emerging in 2016

Uncategorized Comments Off on Microsoft Cloud – New Security tools emerging in 2016

As cloud based storage and application hosting are strategic for the future, improved security tools will be rolled out in 2016 to facilitate management and protection for these critical resources. http://www.pcworld.com/article/3038043/microsoft-adds-new-security-enhancements-to-its-cloud-offerings.html http://www.csoonline.com/article/3005736/data-protection/microsoft-touts-new-holistic-approach-to-enterprise-security.html Microsoft is adding a range of new security management and reporting features to its Office 365 and Azure cloud services as part of […]

Malware – Fake Zika Virus news alerts spammed in Brazil

Uncategorized Comments Off on Malware – Fake Zika Virus news alerts spammed in Brazil

Symantec shares a security alert on a massive spam campaign in Brazil that centers around the Zika virus concerns.  Malware authors often sensationalize around major news events as bait to infect home or corporate users. Users should always go to mainstream news sites to verify these claims, rather than clicking on a potentially malicious link. […]

Leadership – Ask probing questions to learn from others

Uncategorized Comments Off on Leadership – Ask probing questions to learn from others

John Maxwell’s leadership blog shares excellent advice on preparing good probing questions in advance. This is beneficial when interviewing users, executives, or others involved in IT or business projects.  http://www.johnmaxwell.com/blog/my-favorite-questions-to-ask-to-engage-others-and-learn-from-them Whenever I am preparing for a meeting with someone, I spend time determining what questions I want to ask. I do this because I want […]

Network Vulnerability Analysis – Linux and Unix audit tools

Uncategorized Comments Off on Network Vulnerability Analysis – Linux and Unix audit tools

All computers and applicable devices in a corporate environment should be periodically checked using the security audit process and applicable tools.  Some good resources are shared below to facilitate these needs for Linux and UNIX operating systems. https://isc.sans.edu/forums/diary/Quick+Audit+of+NIX+Systems/20771/ https://blog.sucuri.net/2016/02/investigating-a-compromised-server-with-rootcheck.html If you think that only computers running Microsoft Windows are targeted by attackers, you’re wrong! UNIX (used here as […]

Microsoft – Security improvements for Health care records

Uncategorized Comments Off on Microsoft – Security improvements for Health care records

Microsoft is highlighting the need for improved protection of patient health care records and will be providing assistance in the coming months. http://www.eweek.com/security/microsoft-calls-for-health-care-security-intervention.html After a seemingly nonstop series of breaches affecting health care organizations, the software giant announces plans to engage with IT security professionals in the industry.   Overflowing with sensitive personal data and payment […]


© 2023 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in