Saturday, March 14, 2015

Tabula Rosa Systems Quote Of The Day From Albert Einstein


 ======================================================

 Technological progress is like an axe in the hands of a pathological criminal.
Albert Einstein
==================================================
**Important note** - contact our company for very powerful IT product solutions including Network, Systems Management as well as IP (IPv4 and IPv6), security, firewall and many other solutions and services:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in just 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Friday, March 13, 2015

Tabula Rosa Product Summary Of The Day - Attivo A New Generation Honeypot




Decades of information security prevention systems have failed to produce an architecture that can stop committed attackers, and in response, they’re making a dramatic shift in their recommendations to security practitioners.” according to wired.com.

A comprehensive security posture needs to include post infection detection to complement today’s security infrastructure. Many enterprise organizations look to deploy a layered security strategy designed to maximize attack coverage and mitigate risks to intellectual property and corporate assets. Given the complexity of today’s threat landscape, it is vital to have defense mechanisms that can protect against the many different attack vectors used to infiltrate and exploit an organization.

Attivo Networks BOTsink Solution brings a new layer of security complementing existing infrastructure by accelerating breach discovery and providing a new line of defense designed to make it difficult for attackers to reach or compromise valuable assets. Attivo’s BOTsink Solution is an elegant way to trap the BOTs and APTs that bypass perimeter and endpoint security. Laying a trap is the best way to catch the bad guys—it is very efficient and cost effective. “Offensive Deception” is the best technique to deal with attacks that manage to get through traditional security infrastructures.

BOTSink Solutions Deliver Vital Post-Infection Detection

Attivo Product Summary
  ============================================

**Important note** - contact our sister company for very powerful solutions including network perfomance products as well as IP management (IPv4 and IPv6, security, firewall and many other IT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in just 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================



Tabula Rosa Systems Quotation Of The Day - Internet Security - Is It Worth It?

 ======================================================
“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.
— Richard Clarke
==================================================
**Important note** - contact our company for very powerful IT product solutions including as well as Network, Systems Management as well as IP (IPv4 and IPv6), security, firewall and many other solutions and services:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in just 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

video

Thursday, March 12, 2015

Tabula Rosa Systems Technical Bulletin - Vulnerability Summary for the Week of March 2, 2015

 =============================================================

National Cyber Awareness System:
03/10/2015 07:56 PM EDT

Original release date: March 10, 2015
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.
The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
·         High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0
·         Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9
·         Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9
Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

High Vulnerabilities

============================================

**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Wednesday, March 11, 2015

Tabula Rosa Systems The - 10 Golden Rules Of Facebook Etiquette

I have stated a number of times that Netiquette for email has many core principles which are similar with Facebook. The article below echoes this.

The 10 Golden Rules Of Facebook Etiquette

Your Tango‎ February‎ ‎20‎, ‎2015

By Tom Miller

Facebook, like nuclear technology, is a tool that can be used for good as well as evil. And there are clearly some people who lack the ability (or desire) to use either responsibly.

One of my all-time favorite Facebook stories involved a recent college graduate backtracking it to the old Alma Mater on a recruiting trip. He went to a neighborhood watering hole, flashed some of that first-year cash and, later, worked on his night moves with a fine, young coed. Unfortunately, he knew she was going to Facebook (it’s a verb now) him and he still had a few days in College Town, USA. So, he did the prudent thing and changed his status to Single. He and his old girl were on the rocks and he thought he’d enjoy the rest of the trip. This was how now ex-girlfriend found out. She was dumped by Facebook.

And because this is neither Vietnam nor the Wild West, we decided to implement some rules of etiquette for Mark Zuckerberg’s handiwork. 

Here are the top 10 rules of etiquette for using Facebook responsibly in and around relationships:

1. Relationship status is a mutual decision. As illustrated above, lots of problems can arise from a unilateral status change. All of your friends get that update in real time - not a fun way to find out that the dream is over.

2. It’s OK to look through your friend’s friends for people you might want to meet/date/friend. It’s not OK to skip the middleman on the introduction. I get freaked out when anyone I don’t know tries to friend me. I assume they’re trying to sell me something, stalking me or both. As always, be mindful of friend-poaching, it’s not cool.

3. Ask first before friending a close friend’s ex-squeeze. It’s common courtesy and it’s part of the bro code.

4. It’s OK to remain friends with someone you used to date on Facebook. We can be grown-ups about this. Just prepare yourself to see some status updates that you could probably do without.

5. Posting a ton of pics, vids and comments regarding a recent, failed relationship is a bad idea. If you need a lifeline, phone a friend don’t ask the audience.

6. As with all things, there is such thing as too much information. The airing of grievances are best done over email, telephone and brunch. Likewise, starting a group about how “John Tucker must die,” while possibly cathartic, smacks of sour grapes. Starting a Facebook group called “I Hooked Up With Dane Cook And All I Got Was This Lousy Comedy CD” is, however, hilarious. Also, keep them photos safe for work.

7. This is sort of an addendum to 2 previous rules, but it bears its own space: Don’t friend an ex’s new squeeze if you’re not actually friends. It’s easy not friending someone. In fact, it takes more energy to friend someone than not friend them. Nothing good can come of this. It’s the social media equivalent of John Cusack watching through the eyes of John Malkovich’s daughter as Cameron Diaz and Catherine Keener kiss in the end of Being John Malkovich. No, life isn’t fair.

8. Know the difference between the Timeline and a private message. Facebook should devise a multiple-choice test for every new member. It will include questions like: The note “I luv u sooooo much baaaaaaaaby. I can’t waaaaaaait too seeee u 2nite” belongs in A) a private message; B) the timeline or C) a coloring book for the mentally-special. In addition, know when and whom to Poke, Super Poke, Gift and, if it exists, Super Gift.

9. The interweb is not a therapy session and shouldn’t be used with severely impaired judgment. For instance, there are only 2 occasions when you tell someone that you had a huge crush on them in high school (if you must): a best-selling memoir or in a situation where you think this may get them to sleep with you … in the next 15 minutes. Definitely not on their Facebook Timeline.

10. Above all other rules (in this actually is in the Facebook rules), do not create a fake page as a way to punish an ex. Creating a page about your old flame and including; “pooping in the bed,” “giving people crabs” and “stealing from people I date” as favorite pastimes may seem funny, but it’s petty and it’s a pretty good way to get sued for like $40,000 (see the case of Raphael, Grant).

Follow these 10 simple rules and people across the land will say, “Hey, that [insert your name] is pretty responsible with [insert your gender-specific possessive pronoun] use of Facebook in a relationships setting.”
 ============================================
**Important note** - contact our sister company for very powerful solutions including Crossware, a powerful email signature software product as well as IP management (IPv4 and IPv6, security, firewall and many other IT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in just 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tuesday, March 10, 2015

Netiquette IQ Security Alert From US-Cert - Apple Addresses FREAK With New Releases

 =============================================================

National Cyber Awareness System:
03/09/2015 08:52 PM EDT

Original release date: March 09, 2015
Apple has released security updates for OS X, iOS, and Apple TV to address multiple vulnerabilities, one of which may allow an attacker to decrypt secure communications between vulnerable clients and servers (FREAK).
Updates available include:
  • Xcode 6.2 for OS X Mavericks v10.9.4 or later
  • Security Update 2015-002 for OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.2
  • Apple TV 7.1 for Apple TV 3rd generation and later
  • iOS 8.2 for iPhone 4s and later, iPod touch (5th generation) and later, and iPad 2 and later
US-CERT encourages users and administrators to review Apple security updates HT204427, HT204413, HT204426, and HT204423, and apply the necessary updates.
 ============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tabula Rosa Systems Security Alert Has ISIS Hacked U.S. Websites?


Hackers Claiming to Be ISIS Hit Several US Websites

By M. Alex Johnson

A Montana credit union's website and the home pages of several other U.S. entities were taken over by hackers claiming to be affiliated with ISIS over the weekend, but authorities doubt there's any link. 

Customers who went to Southwest Montana Community Federal Credit Union's site Saturday were greeted by a picture of the black ISIS flag and the words "hacked by ISIS, we are everywhere," with a Facebook address that doesn't exist. The site was taken down and remained down Sunday night, with the message "Under Construction." 

The credit union's chief executive, Tom Dedman, told NBC station KTVM of Butte that the site was offline so a security specialist could investigate. 

Silver Bow County Sheriff Ed Lester told KTVM that no account information was compromised. He said his office had contacted the FBI, but he was highly doubtful that the hack anything to do with the Islamist extremist group. 

"I don't think ISIS agents would be interested in a hack like this," Lester said. "I think this is more likely a domestic hacker rather than international cyberterrorism."
Similar hacks were reported at:
  • Two companies in St. Louis: MERS Goodwill and the digital agency Elasticity. MERS Goodwill Executive Vice President Mark Arens told NBC station KSDK: "I had a lot of disbelief. Kind of turned to my wife to say we've been attacked by ISIS. She had a number of questions."

  • The historic Montauk Manor, a condominium complex on New York's Long Island. "It's been a fun day," Kathy Surrey, the complex's night manager, told the newspaper Newsday. "I don't mind the advertising, but this isn't good advertising."

The home page of Southwest Montana Community Federal Credit Union was replaced with the ISIS standard. Authorities say no account information was compromised.