Category Archive: IT Security

Bring Your Own Device (BYOD): Is BYOD Bad for Your Company?

Microsoft Surface RT Tablet

Microsoft Surface RT Tablet

Until recently when we thought of computing devices, we usually thought of PCs and laptops. Today, with tablets and smart phones selling in the millions on opening weekend, we have a very different picture of what a computing device is.

If you’re not familiar with it, BYOD (Bring Your Own Device) is the idea of using a consumer computing device (such as an iPad or Surface RT tablet) to get work done, either in the office, at home, or on the road. Most of these devices were not designed to “get work done”, but instead to consume content (ex: checking email, reading news websites/apps, etc.). These devices are not managed, and may not have even the most basic security features enabled. This can spell disaster for any corporate network. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/11/cloud-computing/bring-your-own-device-byod-is-byod-bad-for-your-company/

Preventing Pop-ups and fake security

We have become so dependent on this electronic world we have built.  With such critical information as medical records and banking, it is imperative that we protect ourselves from the many cyber threats lurking at every turn.  

Common variants of these cyber threats are pop-ups and fake security applications (ie. fake anti-virus, fake anti-spyware, and fake anti-malware). The best way to stop these threats is to prevent them from ever taking hold of your system in the first place. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/10/it-security/preventing-pop-ups-and-fake-security/

People Keep Getting Spam Emails from My Email Address. What Do You Suggest?

There are actually several ways to send email as another person, making it look like they actually sent the email. Most of these methods don’t actually require access to the users Email mailbox. This is what we refer to as spoofing. If you’ve ever received an Email from yourself, then you know what I’m talking about. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/07/it-security/people-keep-getting-spam-emails-from-my-email-address-what-do-you-suggest/

Recovering from a Spyware or Virus Infection

In my previous post (Preventing Spyware or Virus Infections) I explained how to help protect yourself from virus and spyware infections. If you still do contract a spyware or virus infection, there are a few things you can do to clean up your PC or laptop. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/05/it-security/recovering-from-a-spyware-or-virus-infection/

Preventing Spyware or Virus Infections

The best way to fight malware or viruses is to prevent them from infecting your computer in the first place. You can help keep your computer protected by: Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/04/it-security/preventing-spyware-or-virus-infections/

How to Securely Dispose of Your Old Hard Drives

The hard drive in your PC or laptop holds all of your data and applications. It is kind of like long-term memory for a computer. Just like in the movies, even when you erase that data, remnants are left behind making it often possible to recover the data long after it has been deleted. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/04/it-security/how-to-securely-dispose-of-your-old-hard-drives/

Is your home Wi-Fi secure?

Wi-FiAnswer: Probably not. Most home networks are not secure to begin with. To add wireless A/B/G/N on top of that, you’re really asking for trouble. Fear not, for here are a few things you can do to lock down your environment, and keep out snooping eyes. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/04/it-security/is-your-home-wi-fi-secure/

IT Security is Like an Onion – IT Security Basics – Part 3: End-User Security

In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/

IT Security is Like an Onion – IT Security Basics – Part 2: Server Security

In Part 1 I discussed securing your network perimeter. But as I said in the beginning, IT security is like an onion. Let’s take a look at the next layer of that onion… securing your server environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-2-server-security/

IT Security is Like an Onion – IT Security Basics – Part 1: Perimeter Security

In this day and age, every organization should have a good firewall at the perimeter of their network. There are firewalls all over the spectrum and many good options for businesses small and large. For small businesses there are great firewall units designed for the SMB market from companies like Cisco, Sonicwall, and Astaro. For medium to enterprise size organizations, or if you just want that extra capacity, there are some really fantastic devices from Cisco, Fortinet, and Astaro that should give you the functionality and flexibility you need. Regardless of the manufacturer, there are key components which are critical to your network’s security. Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-1-perimeter-security/

IT Security is Like an Onion: The Basics of IT Security Blog Series

In many ways, IT security is like an onion comprised of many layers. As you work through each layer new layers are revealed. This blog series is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Long gone are the days where antivirus software alone is enough security! This is a 3 part series outlining Perimeter Security, Server Security, and End-User (client) Security.

Part 1, Perimeter Security will be available on Monday March 19, 2012.

Part 2, Server Security will be available the following Monday March 26, 2012.

Permanent link to this article: http://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-the-basics-of-it-security-blog-series/

What is FOPE (Forefront Online Protection for Exchange)?

Forefront Online Protection for Exchange (FOPE) is one of the unsung heroes of the Microsoft Exchange world.

If you’ve been running Microsoft Exchange for your organization, chances are you’ve heard of Forefront Protection for Exchange. This is a software which sits on servers in the datacenter and monitors all incoming and outgoing email to protect against spam and malware threats (among other threats). One of the biggest concerns I hear from administrators, when considering email protection, is not feeling comfortable enough with their security experience to be responsible for something so critical as Forefront Protection for Exchange.

Read the rest of this entry »

Permanent link to this article: http://www.robertborges.us/2012/03/it-security/what-is-fope-forefront-online-protection-for-exchange/