Hello:
Kinda related to a previous thread, but not the same question so.....
Awhile back, I backed up my iPhone 5S to a computer. I have sensitive data on in (on the strong end, my clients personal financial data/SSN/cc numbers). I need/want to securely remove all of my phones backup data from...
appdata
backup files
backup management
computer safety
credit card
data recovery
datasecurity
eraser
file removal
file system
financial information
itunes
multi-pass deletion
privacy
secure deletion
sensitive data
ssn
user data
windows
I'm trying to understand the nature of virus/malware/ransomware to better apply my backup strategies. So here are some questions I have:
Question Scenario #1 -
Lets say I have 2 internal hard drives connected to my PC. One with Windows10 installed and the other one with Linux installed. I use...
Severity Rating: Critical
Revision Note: V1.0 (March 14, 2017): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge...
control system
critical
cumulative
datasecurity
exploit
march 2017
microsoft edge
ms17-007
remote code execution
revision note
security update
update bulletin
user rights
vulnerabilities
webpage
Original release date: October 14, 2016
Systems Affected
Internet of Things (IoT)—an emerging network of devices (e.g., printers, routers, video cameras, smart TVs) that connect to one another via the Internet, often automatically sending and receiving data
Overview
Recently, IoT devices...
We anticipate threats like files being deleted from servers by disgruntled employees.
1. Can someone suggest what preventive measures that can be implemented ? (DLP implementation is in pipeline, but would like to see if there are alternate measures)
2. If somehow files are deleted, we would...
access control
audit events
data loss prevention
datasecurity
dlp
employee threats
environment
file auditing
file deletion
file tampering
incident response
it governance
it security
log monitoring
monitoring tools
preventive measures
server 2008
server 2012
server management
Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
administrative rights
attackers
bulletin
critical update
cumulative update
datasecurity
exploit
internet explorer
ms16-118
october 2016
patch
remote code execution
revision note
security
system control
update
user accounts
user rights
vulnerabilities
webpage threats
Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted...
administrative rights
august 2016
critical
cybersecurity
datasecurity
exploit
exploitation
microsoft
ms16-102
patch
pdf library
remote code execution
security bulletin
security update
software update
technical note
user account control
user rights
vulnerability
windows
Do ya'll use Bit Locker? All NSA and Microsoft backdoor, giving the keys to the government, talk aside.
I'm more interested in encrypting my drive to keep my information safer, in case it's stolen or some type of malware gets on.
I'm interested in hearing people's experiences using it. Did you...
This is not a problem for me but I did not know where to post this question
Which is: When a computer is infected with Ransomware is just the C drive encrypted or do all other partitions and hard drives encrypted? I have 3 hard drives and one is external that is always connected with a total of...
I am trying to make a backup to an external hard drive, but I get the following error when I try to select the hard drive, or any drive for that matter;
"Backing up to this type of device is disabled by your system administrator"
Is there a place I can change this setting?
Dear all,
I am trying to find a way how to block USB, but only read from USB. To be more specific, I want to allow copy from computer to USB, but deny copy from USB to computer.
Is there any way how to do it with Microsoft tools or free programs?
Thank you in advance
LostInHistory
I have found with Disk Investigator scores of urls and passwords on my disk that windows7 has somehow put in the clear on my C drive. I have tried using HxD to overwrite the passwords, but windows7 gives me an 'Access denied' message when I try to save the changes. This write is supposedly...
access denied
backup
c drive
data protection
data recovery
datasecurity
disk investigator
disk management
file access
file system
hxd
linux
overwriting
paragon
passwords
restore
security
trustedinstaller
windows 7
winhex
I think I posted the original in the wrong thread so I decided to post it here also. Sorry for the double post.
Hi. I tried to install Windows 10 today, but failed three times. I'm running Windows 7 64. I went through the process of downloading and installing Windows 10. I get a window asking...
backup procedures
configuration
datasecurity
error message
forum help
hard drive
installation
installation problems
locked drive
missing files
personal data
system requirements
technical help
troubleshooting
upgrade issues
user interface
user support
windows 10
windows 7
In Windows 7 SP1, I disabled automatic unlock for my data drive E: temporarily. When I went back later to re-enable the automatic lock for that drive, I got the error "Element Not Found". This happens when using BitLocker Manager or when using the "manage-bde -autounlock -enable E:" command line...
In this episode of Data Exposed, Scott welcomes Jakub Szymaszek, a Senior Program Manager in the SQL Server team. In this episode, Jakub discusses the Always Encrypted technology in SQL Server 2016. Quite different from TDE, Always Encrypted, as Jakub explains, is the encryption of data not only...
2016
always encrypted
architecture
credit card
data exposed
datasecurity
demo
encryption
end-to-end
jakub szymaszek
program manager
query processing
sensitive data
sql server
tde
technology
I have very sensitive company documents that I have to work with on a daily basis. It is critical that these documents not be accessible by others (mainly competitors).
The documents are created, maintained, and stored on a secure, never online Linux machine. However, a couple of times a week...
backup strategy
competitor access
confidentiality
datasecurity
document protection
file accessibility
file management
information safety
kaspersky
linux
network safety
offline use
printing
privacy concerns
security lapses
sensitive documents
system setup
usb transfer
windows machine
Keith Mayer and Andy Syrewicze are back for the next part in their “Build Your Cloud” series and in today’s episode they discuss how you can protect your data in the cloud through At-Rest Data Encryption.
[Link Removed] What are some at-rest data encryption options?
[Link RemovedLink Removed...
andy syrewicze
at-rest encryption
bitlocker
cloud lab
cloud management
cloud solutions
cloud storage
data protection
datasecurity
encryption
free downloads
hybrid cloud
hyper-v server 2012
keith mayer
microsoft azure
security
system center 2012
technet radio
virtual machines
windows server 2012
I'm running regular backups on my Windows 7 computer. My destination for most backups is a USB 3.0 hard drive. I have several internal hard drives that I also use, but I'm using the USB drive so that I can totally isolate the backup files from anyone out there who wants to do harm to my system...
Back in October, we Link Removed how security and identity features will continue to evolve in Windows 10. This week at the RSA Conference in San Francisco, we’re providing more details on what this means for our enterprise customers.
Earlier today, Scott Charney, Corporate Vice President of...
hi
at windows 8 i deleted some files and moved to recycled bin. after that I made recycled bin empty
but as I heard there still are ways to recover deleted files.
which program can I use to wipe the deleted data without option to recover it? i know revo uninstaller is good for programs...