kdkconsulting.com
08 | August | 2015 | KDK Consulting
http://kdkconsulting.com/archives/date/2015/08/08
Technology Solutions for Everyone. Daily Archives: August 8, 2015. Hackers Broadcast Porn on TV Screens at Brazil Bus Depot. August 8, 2015. Sao Paulo – Hackers infiltrated the travel information video screens at a Brazilian bus station and replaced arrival and departure times with hard-core porn. The sex footage ran for 15 minutes Friday evening at the Boqueirao station in the southern c… Continue reading →. Comments Off on Hackers Broadcast Porn on TV Screens at Brazil Bus Depot. August 8, 2015.
groundsecurity.com
GROUND Security » Did you know: Standardized Risk Assessments
http://www.groundsecurity.com/2013/07/did-you-know-standardized-risk-assessments
Did you know: Standardized Risk Assessments. July 23, 2013. Did you know that the National Institute of Standards and Technology (NIST) publishes Special Publication 800-30, Guide for Conducting Risk Assessments? This is one of several guides that GROUND Security incorporates within our assessment and analysis framework. You can find the document on NIST’s website: http:/ csrc.nist.gov/publications/PubsSPs.html. Next Post →. Leave a Reply Cancel reply. You must be logged in. To post a comment.
groundsecurity.com
GROUND Security » Category » Home Users
http://www.groundsecurity.com/category/home-users
July 19, 2013. Some useful tips for home users to help stay protected on the internet:. Http:/ yourhub.denverpost.com/parker/protect-your-identity-defending-your-internet/vGVQ6vjQnuGobG0KjFSgwI-ugc? Why I hate McAfee (the company) and why you should, too. Data Backups: Can you rely on tape? Did you know: Standardized Risk Assessments. Millennium Hotels and Resorts Investigating Possible PoS Breach. Researchers Use MiTM Attack Against Ransomware Operator. 10 Ways to Protect Against Dual Revenue Attacks.
groundsecurity.com
GROUND Security » Vulnerability Management
http://www.groundsecurity.com/vulnerability-management
GROUND Security can work to help design and implement an effective vulnerability management process for your organization. As part of your vulnerability management plan, some of the areas that will be considered are:. Ongoing notification and identification of new vulnerabilities. Assessment and documentation of the risk to the organization. Development of remediation or risk-reduction plan. Regular patching and system update schedule. Verification of remediation plans tasks and objectives.
groundsecurity.com
GROUND Security » Security Camera Solutions
http://www.groundsecurity.com/security-camera-solutions
To complement your physical security initiatives, GROUND Security can assist with the design and installation of security camera systems at your facility. Using either an IP- or CCTV-based camera system, entryways and other important areas of your facility can be monitored and recorded remotely. Camera systems can be designed to customer specifications to include any of the following features:. Remote viewing from the internet or the LAN. Remote viewing from PC’s, smartphones, and tablets.
groundsecurity.com
GROUND Security » Network and Systems Engineering
http://www.groundsecurity.com/network-and-systems-engineering
Network and Systems Engineering. GROUND Security professionals are trained and qualified to assist in the design, implementation, and ongoing support of customer systems and networks. Our team can help to implement secure networks and hardened device configurations as part of your larger security goals. GROUND Security has experience architecting, configuring, and maintaining secure solutions with equipment from the following manufacturers:. Why I hate McAfee (the company) and why you should, too.
securingyour.info
humint Archive - securingyour.info
http://www.securingyour.info/category/humint
Question the integrity of your security. Oct 20, 2010. Comments Off on Infosec: “Nuclear secrets” found on unencrypted USB stick. Infosec: “Nuclear secrets” found on unencrypted USB stick. According to Credant vice president, whilst the convenience of USB sticks make them an important tool for any business, you don’t have to be a nuclear scientist to know that the data carried on these devices must be protected. As the coach driver is quoted as saying in the local press. I don’t know what is worse ...
securingyour.info
Encryption Archive - securingyour.info
http://www.securingyour.info/category/crypto
Question the integrity of your security. Oct 9, 2012. Comments Off on InfoSec: How IT security can drive business and enable innovation. InfoSec: How IT security can drive business and enable innovation. Information security threats should be understood and addressed as a whole, not in a standalone manner. These threats should be considered in combination with those that depend on the human factor, and should be guided by a concise framework based on international practices. To find out how. Oct 20, 2010.
securingyour.info
CCTV Archive - securingyour.info
http://www.securingyour.info/category/cctv
Question the integrity of your security. Jul 18, 2012. Comments Off on CCTV: The Security Institute launch new CCTV guide. CCTV: The Security Institute launch new CCTV guide. The aim of this guide is to introduce the reader to the many considerations which need to be taken into account when introducing CCTV into the workplace. This guide covers all processes, from the initial intention of installing CCTV to the running and management of a system. In a statement, the Security Institute explained:. Did dom...
SOCIAL ENGAGEMENT