I came across a very handy document from www.securingthehuman.org that explains which security standards and awareness compliance requirements might apply to your organization. It is by no means a complete listing, but gives the one minute run-down of the majority of the biggies…. — Last Updated: 19 July, 2011 1. Executive Summary The purpose of this document is to identify …
Cisco OnPlus service available now to small & medium businesses
Large businesses have full-time IT staff or fully outsourced IT support that provide monitoring of their infrastructure and keep them up to date and now small & medium (SMB) businesses can have the same level of support when it comes to devices on their network. Cisco OnPlus works by allowing Homeland Secure IT or your Cisco SMB service provider to place …
Microsoft updates for Windows, Windows Server and Microsoft Office for Sept 13, 2011
Multiple vulnerabilities in MS Windows, MS Windows Server and Microsoft Office have been identified and addressed. These should not be taken lightly as they are of a critical nature, allowing a “remote, unauthenticated attacker” the ability to gain access to your system, as well as DoS. If you require assistance applying updates to your business computers in the Greenville / …
Apple’s Mac OS X Lion poses enterprise security risks (this is not a repeat)…
Using Mac’s in your enterprise? You will want to read this article http://www.theregister.co.uk/2011/08/26/mac_osx_lion_security_hole/… This is kind of a big deal, as it underscores that Mac OS X Lion machines simply fail at LDAP, a basic part of enterprise network integration. In short, if you bring these Macs into your environment, once authenticated, they simply don’t care which password is entered, they …
Why do you need power protection?
Everyone wants to save a dollar or two, so they buy the new computer, monitor and printer, and skimp on some of the other components. One in particular is power protection. By power protection, we mean surge protectors and uninterruptable power supplies (UPS) primarily. The fact that a few dollars were saved on the front-end may end up costing big …
Homeland Secure IT is giving away an XBOX 360 Arcade system for no particular reason…
It has been too long since we gave something away! Well, that’s not entirely true… We “give away” excellent computer, server and network service, support and repair at amazingly low rates every day! However, that is not what I am talking about. I’m talking about giving away an XBOX 360 Arcade system from Microsoft which will give you hours of …
Advantages of equipment leasing and financing for your business IT needs
When we offer computers, servers, VoIP phone systems and other network equipment that reaches a certain amount, we always recommend clients consider leasing… According to our leasing partner, as one of the fastest growing methods for acquiring capital equipment and software, leasing might be a wise decision for your organization: Lease or finance new equipment and software with as little …
Tampering with network equipment can be hazardous to your health…
“Tampering with this network equipment may result in an ass whoopin’ you’ll never forget”… Makes me laugh every time I see it! I bet every IT professional would love to see this sticker on every server room door. How much money would be saved on computer, network & server service, repair or support, especially if someone actually was …
Atlanta Georgia to get centralized monitoring of public and private surveillance cameras
Privacy advocates are fired up over the multi-million dollar video integration center planned for Atlanta Georgia. This system will monitor up to 500 cameras simultaneously, some owned by the city and some private, at a centralized data center. At that center, software will be in place that can identify “suspicious” behavior and allow monitoring employees to deploy emergency personnel rapidly. …
Secure IT Alert: CERT Issues Security Recommendations to Prevent Cyber Intrusions
Homeland Secure IT Alert for Wednesday, July 21st, 2011 The United States Computer Emergency Readiness Team has issued their recommendations for protection against network intrusions. I have included the entire document below, but the most current version of the document can be found here. Please keep in mind that these recommendations are not related to any one platform. These are …