Independent

ComputerWorldIndependent

14% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest – Deal Alert

Credit to Author: DealPost Team| Date: Thu, 13 Apr 2017 10:31:00 -0700

Be it a lightning strike that destroys a home entertainment center or consistently fluctuating power that degrades the performance and shortens the life of your electronics – surges, lightning, and other power disturbances can have a devastating impact on the valuable electronics you rely on every day. The P11U2 from APC offers guaranteed surge protection. Connect and protect up to 11 electronics, and conveniently charge your mobile devices via 2 additional USB ports. Installation is convenient and easy with a 180-degree rotating power cord and right-angle plug. Lastly, three LED indicators inform you if there is any overload, unit, or wall wiring issues. The P11U2 averages 4.5 out of 5 stars from over 1,500 people on Amazon (read reviews), where its typical list price of $34.99 is discounted 14% to $29.99. See this deal on Amazon.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Improve your internet privacy, with or without help from the government

Credit to Author: Robert C. Covington| Date: Thu, 13 Apr 2017 08:39:00 -0700

President Trump, as part of his plan to roll back regulations put in place by President Obama, just signed legislation that eliminates the prohibition against internet service providers selling customer data without their written consent. Although the original restriction had not yet taken effect, its elimination ignited a firestorm of controversy among privacy organizations, including the Electronic Privacy Information Center and the American Civil Liberties Union (which tried to no avail to get Trump to veto the legislation at the last minute).

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

Know your community– Tessy (Takayuki Terashima)

Credit to Author: Maor Schwartz| Date: Wed, 12 Apr 2017 13:07:37 +0000

Takayuki Terashima, also known as Tessy (@tessy_jp), is one of AVTOKYO founder, Vice Executive Committee Chairman at SecCon and CTF team leader! Questions Q: How many years have you been involved in the security field, what was your motivation to get into it the first place? A: About 16 years. I started to work for … Continue reading Know your community– Tessy (Takayuki Terashima)

Read More
ComputerWorldIndependent

Microsoft kills off security bulletins after several stays

Credit to Author: Gregg Keizer| Date: Wed, 12 Apr 2017 13:21:00 -0700

Microsoft this week retired the security bulletins that for decades have described each month’s slate of vulnerabilities and accompanying patches for customers — especially administrators responsible for companies’ IT operations.

One patch expert reported on the change for his team. “It was like trying to relearn how to walk, run and ride a bike, all at the same time,” said Chris Goettl, product manager with patch management vendor Ivanti.

The move to a bulletin-less Patch Tuesday brought an end to months of Microsoft talk about killing the bulletins that included an aborted attempt to toss them.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Crafty Ohio inmates scavenged parts, built PCs for hacking and hid them in ceiling

Credit to Author: Darlene Storm| Date: Wed, 12 Apr 2017 06:51:00 -0700

What can a computer recycle program and a little shoulder-surfing get you? For inmates at Ohio’s Marion Correctional Institution, it got them a great deal, enough to build two PCs from the yanked parts and then hide them in the ceiling, use a former employee’s credentials obtained by looking over his shoulder, and then commit “possible identity fraud along with other possible cyber-crimes.”

The Ohio Inspector General’s 50-page report (pdf) includes a big list of fails for the Ohio Department of Rehabilitation and Correction. The report reads like a mini novel of intrigue, weaving lax security as well as players across the prison system and prisoners into the story.  

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Credit to Author: Ira Winkler| Date: Wed, 12 Apr 2017 04:00:00 -0700

When I served on a panel about data breaches at the ISACA Silicon Valley chapter conference recently, the moderator asked, “To prevent data breaches, which is more important: process, technology or people?”

My fellow panelists (three CISOs and two highly experienced consultants) all answered ahead of me: “People.” I was surprised. Here I was the only awareness specialist on the panel, yet my answer was process.

Without process, I explained, the people don’t know what to do. Without process, there is no right way to implement technology. Process is implemented through governance. As I discuss in Advanced Persistent Security, without governance your security program is an accident.

To read this article in full or to leave a comment, please click here

Read More