Tag Archives: internet security

National Cyber Security Awareness Month 2014

Become a company or organization that helps bring Cyber Security Awareness to users. TCAT Shelbyville has been listed as a champion for years and promotes cyber security awareness to higher education and end users. List of all champions Activities you … Continue reading

Posted in Technology | Tagged , , , , | Leave a comment

Free tool repairs critical Windows configuration vulnerabilities

“”Tripwire announced SecureCheq, a free configuration utility that helps evaluate and repair the most common, critical configuration vulnerabilities in Windows desktops and servers.”” Free tool repairs critical Windows configuration vulnerabilities (By AddThis – NetSecurity.org)   This excellent tool scans your system … Continue reading

Posted in Technology | Tagged , , , , , | Leave a comment

300,000-plus wireless routers have malicious changes

ARSTechnica outlines how hackers have made malicious changes to routers….again. Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made … Continue reading

Posted in Technology | Tagged , , , , , | Leave a comment

Solving The Security Workforce Shortage – DarkReading

According to the study, the most sought-after quality is a broad knowledge of security — more of a strategic understanding than technical know-how — followed by certifications.  Read More Opinion – While certifications are an important part of IT, the … Continue reading

Posted in Apple, Computer Security, Computers, Education, Information Technology, Linux, Mobile Computing, network, Networking, Technology, Windows | Tagged , , , | Leave a comment

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment