RJS Software Blog

RJS, Technology and Security News You Can Use


FakeAV

Horsing around at SchmooCon

Feb 6, 2012 | Filed under: Security

Last weekend I attended ShmooCon, a yearly security conference held in Washington D.C. Today I want to explore several common themes I noted in many of the great technical presentations at the conference.

1) Operations

For many years, the community has been saying that security is facing an operations challenge, not simply one of just technology and cash flow. Simply put, most people aren’t following our advice. Administrators aren’t reviewing logs, systems are still unpatched and users are still running as administrators. Risk increases every day when people don’t do the right thing; this is the fundamental reason most people get successfully attacked.

In many ways, this flaw in operations is like having a horse. You build a great stable. You put in lights and a heater. You put nice locks on the doors. You build out the plumbing system so the horse can have fresh water and then finally … you buy a horse and put it in the stable.  Sadly, most companies get to this point and then, after spending tens of thousands of dollars on their horse, decide spending $100 on oats is too expensive and just toss scraps into the stable as time permits.

Sadly, we live in a world full of dead and starving horses.

Skylanders: a parent’s worst nightmare

Oct 19, 2011 | Filed under: Leigh's Security Tips, Security, Technology

If you're doing a little holiday shopping for the kids, beware of Skylanders!

RJS Security Lunch & Learn – Nov. 9th

Oct 12, 2011 | Filed under: RJS Software Systems

Join us online or at RJS Headquarters for a special security "Lunch & Learn." Mark your calendars for Wednesday, November 9th - visit the blog or events page to register today!

Is this legit?

Jul 21, 2011 | Filed under: Leigh's Security Tips, Security

Is this potential "you've been infected" warning real or fake? You be the judge.

Operation Trident Tribunal

Jun 23, 2011 | Filed under: Leigh's Security Tips, Security

Cyber crime doesn't pay kids. 12 different countries join forces to shut down two successful Latvian cyber gangs.