Trustwave Global Security Report 2014

Cross posted from http://www.securit360.com/blog where I am a regular author. The Trustwave Global Security Report for 2014 was recently released.  There are a number of very useful and insightful statistics in this report, which we can corroborate, based on our assessments of numerous organizations’ networks.  We wanted to highlight a few of these statistics below: Top 10 ... Read More
 

Study: Cost of Data Breaches Increasing

Cross posted from http://www.securit360.com/blog where I am a regular author. A study published by Ponemon Institute, and sponsored by IBM, purported that the average total cost of data breaches increased 15% in the last year to $3.5 million, or $145 per record containing protected information.  The study included participants from 314 companies in at least 10 ... Read More
 

Tips for Spotting a Phishing Email

Cross posted from http://www.securit360.com/blog where I am a regular author. Every day users are targeted with phishing emails from all around the world.  These emails can range from overtly “spammy” and easy to detect, to quite sophisticated an difficult to notice.  We have found that this is typically the least defended position in an organization, ... Read More
 

Verizon Breach Report 2013: What does it mean for your organization?

Cross posted from http://www.securit360.com/blog where I am a regular author. Each year Verizon releases their Breach Report; it is sort of a state of the union with regard to last year’s breaches.  It is worthy research to help determine the industry trends that could help steer the budgets and focus of IT departments.  This year’s ... Read More
 

The Switch to Chip & Pin: Will it change anything?

Cross posted from http://www.securit360.com/blog where I am a regular author. Chip & PIN, the future of credit cards Late next year the U.S. will finally catch upto the rest of the world when it comes to credit card transactions.  Customers will no longer be signing credit card receipts, instead they will enter a PIN, similar ... Read More
 

Password gets the boot, 123456 reigns supreme

Cross posted from http://www.securit360.com/blog where I am a regular author. 2013 crowned a new champion of the #1 password based on passwords collected from data breaches.  The top password for 2012 was ‘password,’ but 2013 announces that ‘123456,’ reigns supreme. SplashData, a security firm, releases their findings each year of the top passwords discovered from ... Read More
 

Target Data Breach Timeline

Cross posted from http://www.securit360.com/blog where I am a regular author. Updated: Originally posted by the WSJ, and sourced here from Business Insider, Target had warning last spring about a new emerging threat against POS systems.  Internal analysts requested additional scrutiny. Updated: According to an article posted on Krebsonsecurity “the initial intrusion into its systems was traced ... Read More
 

Vertical Bar Graph with XSLT in Data View Web Part (DVWP)

As part of a recent project, I needed to create a dashboard page for the requests for executive management. However, since the data was in a list and not a database this was easier said than done. So I started off by researching my options and I found this post on MSDN. This post explains ... Read More
 

Powershell Delete Files After X Days and Keep Log

I have been managing a project to develop a simple app to upload files to a web server. In order to do this with the way we were managing state, we had to temporarily store the file on the server until submit. This posed a problem with files that were put in temp, but then ... Read More
 

Example CAML queries for SharePoint Designer

I have recently been working on a project the deals heavily with XSLT and DVWPs. One thing to keep in mind is that data manipulation done in XSLT is done client side and thus slows load times. This is especially the case if you are just the equivalent of a SELECT * in your CAML ... Read More