Tag: information security


author:

Networks Security

Who Protects the Protectors?


Remember the person in my last post who asked me to describe a load balancer? They came back and asked about ASAs. I’m not sure if they really wanted to know, or if they just liked to see me lose my cool and say …



author:

Security

Microsoft Workstation Logs – Configuration


Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in place. This blog will walk you through configuring event logging on client workstations, and …


author:

Security

Non-IT File Sharing and HIPAA Implications


When I first considered writing this post about possible HIPAA violations, I could clearly imagine how non-IT compliant file sharing could cause issues with HIPAA compliance. It wasn’t until I really started digging into it that a whole world of real-life examples opened up …