Category: Security
-
Sharing Passwords
This is NOT an article about my mother. She just happens to be the person at the other end of this conversation, but it could have been any house guest. My mother has been staying with me for the past few days. It is the first time she has stayed with me, and it has…
-
Folder Redirection: Where’d these warnings come from?
Congratulations. You have decided to implement a Folder Redirection policy on your domain. There are real advantages to this, not the least of which is that all of your users’ profile folders will get backed up centrally… and that when they change computers their files and settings are just there. You have created a Group…
-
1-2-3-4-5 BitLocker 9-8-7-6-5
I was sitting in a planning meeting with a client recently in which we were discussing ways of protecting end-user machines, especially laptops that were in and out of the office. The previous convention relied on BIOS locks that were proprietary to the hardware manufacturer, and required the end user to either enter two passwords…
-
Passwords Revisited… a post from a fellow MVP
Many of you know that I am a fanatic about changing passwords and password complexity. I have written time and again about the subject. (See Pass the Word…) I am also a big hater of what my friend Dana Epp refers to as ‘Security Theatre.’ I have often berated people at Rogers, AT&T, and a…
-
Pass the Word…
How often do you change your online passwords? If you are like the vast majority of us then the answer is not nearly often enough. Until recently I fell into the same category, and fixing that took a little bit of doing. One day several months ago I looked at Theresa and said ‘I think…
-
Two Factor Authentication for Office 365!
NOTE: I did not write this article; in fact, it is copied word for word from an e-mail I received from Scorpion Software. However it is a solution I do believe in. I am not selling for Scorpion Software, nor do I receive any benefit from their sales, nor are the links herein set to…
