Author Archives: Emmanuel Carabott
Is Exchange Anti-Spam Enough?
We all know the importance of network security, yet it is also necessary to strike a balance between its costs and its benefits. This is not easy and there is no golden rule here, with the golden ratio being different …
When You Become the Enemy
Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, …
European Legislation Might Outlaw Security Tools
In a recent post I had outlined my concerns about the Anti-Circumvention rules imposed by ACTA. I had suggested that as a result, legislation could in future be such that using certain tools required by the security profession – which …
You’ve got All Your Security Technologies in Place… Now What?
Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to …
Is Your Deception Defense Strong?
April Fools is a whole day dedicated to the art of deception. Newspapers run spoof stories, pranks are pulled and the world generally does its best to tickle its collective funny bone. For that one day, that brief 24 hours, …
Danish Police Incident Calls for a Security Assessment
A department responsible for IT Security should, obviously, follow those practices it expects others to follow. Sometimes you come across situations where tasks that should fall under an IT security umbrella are handled by an external department which might not …
How to Protect Your Network against DDoS Attacks
The last thing an administrator wants to deal with is a Distributed Denial of Service (DDoS) attack. Yet, together with the recent rise of hacktivism, DDoS attacks are increasingly becoming a threat that IT admins need to prepared for. Just …
ACTA and the Anti Circumvention Clause
This citation concerns you: “Each Party shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors, performers or producers of phonograms in connection with exercise of their rights in …
Troubleshooting Information Overload
Let’s face it; most of us in IT spend entirely too much time in firefighting mode. We talk a great game about being proactive, and keeping ahead of issues; monitoring our systems for utilization and capacity so we can schedule …
51 Items on an Admin’s Wish List for 2012
With the New Year at the corner, it is time to start putting together our admin’s wish list for 2012. Anything goes for this list – new hardware or software for work, changes to procedures or offerings from vendors, geeky gadgets, …









