Independent

ComputerWorldIndependent

Microsoft consolidates its mobile management tools under Azure

Credit to Author: Lucas Mearian| Date: Thu, 29 Jun 2017 13:31:00 -0700

Microsoft has consolidated its Enterprise Mobility + Security (EMS) suite of products under its Azure portal, combining its Intune mobile application management tools and its Azure Active Directory (AD) and Information Protection under a single console.

The move offers a unified admin experience aimed at bolstering enterprise mobility management efforts.

Microsoft introduced the EMS suite in March 2014, targeting businesses with strong mobile and cloud-first strategies.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A Chromebook can increase the protection of air-gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when a computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

A Chromebook can increase the protection of air gapped computers

Credit to Author: Michael Horowitz| Date: Wed, 28 Jun 2017 14:03:00 -0700

I used to think that the best way to protect a computer hosting sensitive data was by not connecting it to any network, a process known as air gapping. Ah, the good old days.

WikiLeaks recently revealed that when the computer with the sensitive data is running Windows, even air gapped protection is insufficient. The CIA, using a software system codenamed Brutal Kangaroo, first infects a Windows computer connected to the Internet, then infects any USB flash drive (a.k.a. thumb drive) plugged into that computer, in the hope that the flash drive will eventually be plugged into the air-gap protected machines.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Why Apple’s future’s up on ransomware

Credit to Author: Jonny Evans| Date: Wed, 28 Jun 2017 03:59:00 -0700

This week’s big security story is the so-called ‘Petya’ ransomware attack. It is not the first such attack, won’t be the last, and its success will prompt cybercriminals to attack again, and again, and again. In this new threat environment, there are zero excuses for any enterprise, public or private, to be running Windows XP, or any other insecure platform.

Even the cops

Chronic underfunding and a conservative government ideologically committed to cuts mean key UK public services remain under threat of cyberattack. In recent weeks, the National Health Service saw its computing systems fail because they relied too much on unprotected Windows systems. This morning we learned that the UK’s Metropolitan Police force still uses over 18,000 computers running Windows XP. The key police force of the UK’s biggest city is therefore currently vulnerable to cyber-attack.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

The price of security: surprisingly affordable

Credit to Author: Sharky| Date: Wed, 28 Jun 2017 03:00:00 -0700

Sysadmin pilot fish works for a company that manufactures steel products that go up — everything from cell towers and guyed masts to utility poles.

“One day a message came into the help desk,” says fish. “A user was concerned that we were going to get audited by the American Institute of Steel Construction, and he wanted to make sure we had all our procedural documentation in order and current.

“His problem was that our web filter was blocking his ability to download the AISC standards documents.”

Fish has a little spare time and he’s very fluent in the use of the web filter, so he picks up the trouble ticket to deal with.

To read this article in full or to leave a comment, please click here

Read More
IndependentKrebs

‘Petya’ Ransomware Outbreak Goes Global

Credit to Author: BrianKrebs| Date: Tue, 27 Jun 2017 20:18:43 +0000

A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware appears to be spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain.

Read More
ComputerWorldIndependent

Microsoft, please stop doing things for our own good

Credit to Author: Steven J. Vaughan-Nichols| Date: Tue, 27 Jun 2017 08:22:00 -0700

For over 20 years, Microsoft stomped on its competitors and then defended itself against the resulting antitrust lawsuits. But with desktop Windows waning in importance and its desktop software rivals largely gone, Microsoft seemed to have turned a new leaf. Or had it?

In the one software sphere left where it still has rivals — antivirus and security software — Microsoft is up to its old anti-competitive tricks. Late last year, Eugene Kaspersky, founder of the eponymous antivirus company, said, “When you upgrade to Windows 10, Microsoft automatically and without any warning deactivates all ‘incompatible’ security software and in its place installs… you guessed it — its own Defender antivirus. But what did it expect when independent developers were given all of one week before the release of the new version of the OS to make their software compatible?”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

With Cisco, Apple weaves itself into enterprise infrastructure

Credit to Author: Jonny Evans| Date: Tue, 27 Jun 2017 07:15:00 -0700

Apple is on course to become the most secure platform provider in the modern enterprise, and Cisco is helping this happen.

You heard that right

“If your enterprise and company is using Cisco and Apple the combination should make the [cybersecurity] insurance cost significantly less for you than it would if you were using some other personal network side and the other operating system in the mobile area,” Apple CEO, Tim Cook, told Cisco Live.

This is a big deal and Cook’s appearance at the show confirms the growing bond between the two firms – and confirms (all over again) that Apple is resolute in its determination to transform enterprise IT infrastructure. Cook even cited the “deeper partnership” with Cisco.

To read this article in full or to leave a comment, please click here

Read More