Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Thursday, September 24, 2015

So Much to Watch - So Little Time!

Yeah, I know... I barely have time to watch these things too, but there is some good stuff out on the interwebs that you might want to check out.

Available Now
On TechNet Radio, in Part 4 in our “To the Cloud” series, Blain Barton examines Microsoft Dynamics CRM and shows us how you can improve your customers' experience with sales, marketing, and customer service anywhere, anytime and with any device.

  • [2:50] DEMO: Dynamics CRM
Tuesday, October 6th
Watch the Microsoft 2015 Virtual CIO Summit, streaming LIVE from the Microsoft Campus in Redmond, WA!
Time: 8:00am - 2:45pm PDT

Hear from industry thought leaders, key Microsoft experts and your peers at this year’s CIO Summit. The Summit will cover key topics ranging from how the digital age is changing the way IT leaders do business to understanding the threats of cybercrime and how changing customer expectations are making strategic IT investments and partnerships all the more important.

Save the date and join us online for the 2015 Virtual CIO Summit to learn more about these key trends and new technologies that can empower you and your business.  Check out the agenda and register here!

Tuesday, March 17, 2015

Live Virtual Event Coming Soon on Security & the Cloud

A Look Ahead: Security & the Cloud Virtual Event is streaming LIVE Wednesday, March 25th.  

Industry thought leaders, Microsoft experts and other Microsoft customers will share their perspectives on what’s next for security and the cloud.  Virtual attendees will have access to behind the scenes interviews and the opportunity to download related session materials, take polls, share ideas, ask questions to experts and speakers through live chat and Twitter.

Agenda Highlights:
·       What is the current cybersecurity landscape? Gartner Research Vice President Lawrence Orans will discuss the current state of cybersecurity and analyze trends going forward.
·       Explore real-world approaches. Tom Flanagan, VP of Technology at Alain Pinel Realtors, and Steve Novoselac, Director of Digital Technology for Trek Bicycle Corp., will discuss their experiences with migrating to the cloud and share best practices.
·       Get an insider’s view on fighting cybercrime. David Finn, Executive Director of the Microsoft Cybercrime Center, shows us what Microsoft does today to deter cybercriminals.
·       It’s all about Windows 10! Stephen Rose, Senior Product Marketing Manager for US Windows and Devices and a former IT Pro, will discuss Microsoft’s next-generation operating system and its security features.

·       Learn how to move ahead with the cloud. The cloud provider market is crowded and the process of moving to the cloud can sometimes be daunting. Microsoft’s Dennis Garcia, Assistant General Counsel, will tell you how to choose a trusted cloud provider and share tips and tricks that will make your transition to the cloud successful. 
Register now so you don't forget!

Thursday, July 10, 2014

Throwback Thursday: Sessions from TechEd Houston

Today is my final installment of highlights from TechEd Houston! Below are some of my session picks from the last day of the conference.

  • TWC: Hacker's Perspective on Your Windows Infrastructure: Mandatory Check List (DCIM-B366)
  • Windows 8 Security Internals (WIN-B350)
  • Real-World Windows 8.1 Deployment Note from the Field (WIN-B358)
  • Providing SaaS Single Sign-on with Microsoft Azure Active Directory (PCIT-B326)
  • Delivering Disaster Recovery Solutions Using Windows Server 2012 R2, Microsoft System Center 2012 R2 and Microsoft Azure (DCIM-B421)
  • How IPv6 Impacts Private Cloud Deployments (DCIM-B373)
  • Windows Server 2003 End of Life Migration Planning for Your Workloads (DCIM-B376)
  • Upgrading Active Directory the Safe Way: Using Virtualization Technologies (PCIT-B341)
For my lists of sessions from the other days, you can find them here: Monday, Tuesday and Wednesday.

Tuesday, October 9, 2012

October is National Cyber Security Month

As a system admin, I like to think that I'm pretty savvy when it comes to online security.  However, it never hurts to look at some current recommendations as a refresher and maybe pass on a link or two to family and friends regarding ways to prevent fraud, theft and other online ills.

Visit the STOP. THINK. CONNECT. campaign or Microsoft's Cyber Security web page for tips on staying aware and secure online.

Check out my previous security posts for some of my thoughts on cyber security. What are your recommendations for friends and family when they ask you about online security? 

Monday, April 30, 2012

Upcoming May Events - Password Stealing; Windows Deployment

Pacific IT Professionals May Meeting - On May 8th This Month!
Date/Time: Tuesday, May 8, 2012 - 6:30pm
Topic: Sam Bowne - CCSF Professor and CISSP will be presenting on Stealing Passwords Remotely & Malware Analysis. Join us to hear Sam talk about Stealing Passwords Remotely & Malware Analysis - it should be a great technical security discussion meeting where you can ask questions and hear some interesting things about Malware and password security.

Please remember to RSVP if you'll be attending.

Also a few upcoming events from Microsoft -

TechNet Webcast: Everything You Wanted to Know and Ask about Windows Deployment (Part 1)
Registration URL:  http://go.microsoft.com/?linkid=9807963  or  http://bit.ly/JLTQLM
Date/ Time: Tuesday, May 15, 2012 - 9-10am (Pacific)
Abstract: In this demonstration-rich, question and answer webcast, Windows Product Manager Stephen Rose moderates an open conversation with Microsoft Deployment Toolkit Product Manager Michael Niehaus and deployment guru Johan Arwidmark. They discuss the new Microsoft Deployment Toolkit 2012 release as well as tips and tricks from the experts about using the Windows Deployment Toolkit.

TechNet Webcast: Everything You Wanted to Know and Ask about Windows Deployment (Part 2)
Registration URL:  http://go.microsoft.com/?linkid=9807964   or  http://bit.ly/Kgny8y
Date/ Time: Thursday, May 17, 2012  - 9-10am (Pacific)
Abstract: In this demonstration-rich, question and answer webcast, Windows Product Manager Stephen Rose moderates an open conversation with Microsoft Deployment Toolkit Product Manager Michael Niehaus and deployment guru Johan Arwidmark. They discuss the new Microsoft Deployment Toolkit 2012 release as well as tips and tricks from the experts about using the Windows Deployment Toolkit.

Friday, July 29, 2011

The Country Code for Nigeria is 234

We all know about the long running Nigerian email scams, the ones where some "Prince" of some "Small Country" has cash he can't access and wants to give you a nice cut if you can front him a couple thousand dollars via Western Union. I guess people have finally caught onto that one, because now the new big Nigerian scam is renting you a place they don't own via Craigslist or some other source for rental listings.

A friend of mine has been looking for a reasonably priced rental in the Bay Area and sent off a few inquires to some nearly "too good to be true" listings. He recieved three practically identical emails in return, from three different "gentlemen", with only the property address, dollar amounts and contact phone numbers differing.

They weren't asking for cash with the first email, but required an odd rental application form to be returned for approval. The emails also had several other characteristics that smell of a farce. See for yourself.

Thanks for the email. My name is Thomas Hough the owner of the 1 Bedroom Apartment you are making inquiry of, I've had so many responses so far,however it is still available but I do have one person who is ahead of you. I'll rent it to whoever puts down the deposit .Rent includes water and garbage. My company sent me overseas and will probably be between Africa, India and the UK for another year or so. The last tenants I had just moved out and my family and friends all live on the east coast so I don't have anyone available to show the place but I can send you pictures of the inside but will have to ship you the keys and papers.

Here is the address:[property address removed]...Ready for immediate move-in!You can drive down there to take a look at it...i will be willing to rent my home out for the maximum of 5 years and below.I personally had wanted to sell the Apartment earlier on.But after long time deliberation between me and my wife Sarah we finally agreed on renting out the Home, because it was initially to be sold. But I really want you to take good care of the Apartment, as if it were your own home.I would want to know how soon you would want to move in, as I will be taking a 1 or 2 month upfront payment which mean the first and last months you will be staying in the Apartment including some utilities (Water, Internet and Garbage). I am asking for $670 1 month upfront payment and if you can pay $1340 for 2months you will be getting a 1 month rent free. I believe we should be able to help ourselves. including utilities because I want you to take a very good care of the Apartment while I am away.

i will like you to go ahead and fill out the rent application form so that will can proceed further and discuss on how to get the the keys and papers sent to you via Dhl or ups e.t.c, also are you ready to rent it now or when?.So here is the Rent Application Form Below..
========= RENT APPLICATION FORM ============

PRIVATE & CONFIDENTIAL

Also,Pls answer these questions below:

1)Your Full Name______________________________________
2)Present Address(where you reside now) & PhoneNumber______________________________
3)How old are you _____________________________
4)Are you married ______________________________ _____
5)How many people will be living in the Home___________________________
6)Do you have a pet _________________________________________
7)Do you have a car __________________________________________
8)Occupation _________________________________________________
9)How long are you willing to stay _________________________________________
10)When do you intend to move in _________________________________________
11)1 month Or 2 month deposit needed______________________________________
12) Pictures of all the Occupant that will stay in my Home______________________________________

P
et allowed.

I will use the information above to prepare the rental agreement , rent receipts and other documents. Make sure the correct information is type.Do reply with your both cell & Apartment number i am going to call you if your application form has been accepted or call me after filling the rental application form. A package containing the housing documents, property address with full description. Including the direction to the place and keys will be ship to you once you both agreed with the term and condition. Call me once you fill out the application form.Here is my contact number: +234-708-289-7758 or 011234-708-289-7758 i will be expecting your call to know how serious you are in renting my Home

Thanks & God Bless

Here are my redflags:

  1. Weird use of capitalization and puctuation, like with "1 Bedroom Apartment" and no spacing after commas, etc.
  2. Claiming to live overseas and having no one to show the place - Really? You've owned a home and don't even know a neighbor? Haven't heard of a property management company?
  3. "I believe we should be able to help ourselves." - Huh? Writing generally has strange phrasing not uncommon to someone who's not great of writing or speaking English.
  4. Weird text-based "rental application" - Most legit landlords will send a PDF version of a standard application, with questions geared so they can run a proper background or credit check. How old are you? Are you married? Do you have a car? How long are you willing to stay? Pictures of all the Occupants? - I don't even know where to begin.
  5. Nigerian contact phone number - Um, yeah. That's a big one.
  6. Property Address (which I removed for this post) - A quick internet search of the property address shows that this place is listed on the MLS for sale. It includes several photographs, including the exterior shot that the scammer sent with this email.
I know the Internet is a big place, filled with lots of opportunity to find what you need and solve problems. But you have to trust your instincts, pay attention and help others who might not be so savvy to look out for stuff like this.

This only happens because it's worth it to scammer. Enough people list out their pet names, attach a family photo and don't give a thought about how odd it is that they are potentially renting a place based on a couple photos and some guy who claims he wants you to "take care of the Apartment like it were your own Home." Clearly, it's lucrative enough to keep doing and that's a real shame.

Stay safe out there and if you come across listings like this be sure to report them to the host of rental listing site so they can be removed.

Friday, February 18, 2011

Check out the Malware Response Guide

Microsoft recently published the new Malware Response Guide, officially known as the Infrastructure Planning and Design Guide for Malware Response

I reviewed this guide in its beta stages a few months ago and it was a great read and a very useful guide.  If you have limited "official" procedures in place for handling infections on workstations, this is a great way to start that discussion with team members and use some of the tools mentioned to develop a plan that is specific to your organization.

I think the structure is well thought out and very logical. One can easily switch to the course of action that fits the needs of the user and the organization, as well as follow the instructions for preparing an offline scanning kit. I also appreciate the recommendations for additional reading so that I can go more in depth for the products I'm using.

While this guide likely won't change my organizations use of a third-party solution at this time, it greatly complements it by providing other tools from Microsoft that can support my existing tools, or give me an alternate set of tools if my vendor isn't as quick to produce a particular solution for new malware.

I think this guide shows that Microsoft is willing to support systems in all types of scenarios and the information is not written to exclude organizations who aren't committed to only Microsoft software. It provides great processes and talking points to bring any organization closer to having a more cohesive malware response plan.  Take a moment to download it and check it out.

Monday, December 13, 2010

Upcoming Tech Events in 2011

Looking to fill your calendar with some free or low cost tech events in early 2011?  Consider some of these:
  • TechNet Events Presents: Virtualization 101 - Microsoft Evangelists will talk about the creation of the hypervisor and demonstrate usage scenaros ranging from the home user up to multinational corporations. Discussions will also include how virtualization has given rise to "the Cloud".  The event is free and will be in San Francisco on 2/2/11, but check the list for dates in Los Angeles, Irvine, Denver, Portland and others locations on the west coast.
  • Data Connectors Tech-Security Conferences - Just like the one-day event I attended a few weeks ago, Data Connectors will be all over the west coast in early 2011.   In particular, find it in San Jose, CA on 2/10/11.
  • She's Geeky unConference - For all those women who embrace their geekiness, save the date for "She's Geeky Bay Area #4" running January 28-30th. 
  • Register by 1/21 and snag a free Expo Only pass to the SPTechCon (The SharePoint Technology Conference) in San Francisco February 7-9th.  The full event doesn't fall into the "low cost" category, but if SharePoint is your thing, you might want consider more than just the expo.
  • RSA 2011 - Another one of my favorites, the "Expo Plus" pass at RSA gets you into the expo hall, the keynotes and one conference session of your choice. RSA will be at the Moscone Center in San Francisco, February 14-18th. 
Plan your time well and you won't have to be in the office for much of the first quarter! 

Monday, December 6, 2010

Take Aways from the Data Connectors Tech-Security Conference

Last week, I attended a free one-day conference hosted by Data Connectors.  Sometimes free conferences aren't worth the time it takes to get there, but I was really happy with this one.  While all the presentations were vendor sponsored, the majority were product neutral and really shared some decent content.  In addition to the vendor presentations, there was a decent sized expo area with other security vendors to peruse.

Here are some of the stats and tidbits I left with. As some of the themes overlapped throughout the presentations, so I'm not going to attribute each bullet point to a specific presenter.  However the presentations were sponsored by the following companies: WatchGuard, Axway, Sourcefire, Top Layer Security, JCS & Associates, Kaspersky Lab, Cyber-Ark, FaceTime and Arora / McAfee.  You can learn more about the presentations specifics and download some of the slide decks here on the event agenda page.

End Users
  • End users in the workplace expect to have access to the web and popular web applications, however 25% of companies need to update their policies related to web use. Instead of addressing the policy issues, companies simply block access to web applications entirely.
  • End users need more education about threats like email scams, pop-ups offering anti-virus solutions, links sent via social media sites, tiny URLs, etc. End users are your biggest threat - often due to error or accidents.
  • The average employee spends 3 hours a day doing non-work items on their computer.
General Company Security and Policies
  • Consider reviewing and improving on your file transfer management practices. How do people share data within your organization and externally? Is it secure and managed?
  • Most companies feel secure, but aren't really. Check out http://www.idtheftcenter.org/ for a list of companies that have experienced data breaches. Many companies simply rely on their vendors to declare that they are secure and protected.
  • Consider using different vendors to protect your data at different levels. Different vendors use different mechanisms to detect and deter threats.
  • As an administrator, you have to review logs on computers, firewalls, servers, etc. This way you are familiar with what is "normal" and can easily recognize potential breaches.
  • Consider data encryption as means to enable your company to meet regulation compliance. Encryption technology has evolved and it doesn't have to be as painful as it has been in the past.
  • You should patch all your computer regularly - don't forget that your printers, routers and switchers are computers too.
Browsers and the Internet
  • The top Internet search terms that are likely to lead you to site with malware on it are "screensavers" (51.9% chance of an exploit), "lyrics" (26.3%) and "free" (21.3%).
  • In 2009, the Firefox browser had the greatest number of patches and overall, vulnerabilities in applications exceeded operating system vulnerabilities.
  • The web browser is the #1 used application, but the patch cycle for browser add-ins is slower than for other applications and operating systems.
  • Drive-by downloads are still the #1 way to exploit computers.
Sometimes I leave conferences scared by the massive list of items that I feel I need to address, however, I left this conference with not only some tasks in mind, but some great leads on how to go about completing those projects.  Check out the Data Connectors events list to see if there is a similar conference coming up in your area in 2011.  They have well over two dozen other planned dates across the US, including Los Angeles in January and San Jose in February.

Thursday, December 2, 2010

All I Want For Christmas is my Credit Card

December started out with a call from my credit card company, reporting a suspected some fraudulent use of my Visa card.  After reviewing some recent charges, there was one that I did not recognize and my card was cancelled.  I have to hand it to CapitalOne – they really are on the ball when it comes to figuring out what charges are legit and which ones are not.  It’s a little bit creepy to be honest. Ah, the age of data mining.

As I was jotting down the list businesses I’ll have to contact to updated my information once my new card arrives, I starting thinking about credit card numbers.  With all the talk about the end of the IPv4 address space, I can’t help but wonder about how many possible credit card numbers are left to distribute, especially with the use of temporary cards, like Visa or AMEX gift cards and the like.

I did a quick little search and found some slightly dated information estimating that even if credit cards only had 10 digits instead of the average 16, there would still be enough numbers to give everyone currently alive on the planet a number, with extras for people being born over the next 25-30 years.  Still that doesn’t seem like all that many to me – I know that my Visa card has been reissued at least 3 times now since I’ve had it, so I might have already used my fair share.

Without spending a lot of time pondering this issue, I guess between the various credit card issuing companies and bank numbers used to create card numbers, it’s possible to have some overlap in the customer identifying portion of the card number without causing a problem. Plus, credit card technology is always evolving.  There is always news about the use of chip cards and there are companies like this one, developing totally new ways of keeping cards secure and easy to use.  A flexible, electronic card with a rewritable magnetic strip? Cool.

Meanwhile, I guess I’ll enjoy this unexpected hiatus in my holiday shopping.The economic recovery will have to manage without me for a few more days.

Wednesday, October 20, 2010

Blog Highlights for October

October is just flying by, but I thought I’d take a moment to toss out a some other great blogs and recent posts that have caught my eye in the last few weeks.  (Many are by some of my fellow Microsoft MVPs, too!)

For those of you in the Exchange camp, check out BlankMan’s Blog, by Nicolas Blank, an Microsoft Exchange MVP. He’s recently posted a link to the Exchange 2010 Architecture Poster and a overview about Exchange 2010 SP1

Thinking about IPv6? Don’t miss out on some recent posts on www.howfunky.com, the blog by Microsoft MVP, Ed Horley.  Are you an ostrich or not when it comes to IPv6? You might want to find out.

Maybe you are on the certification path, if so, don’t miss out on some of the posts on the Born to Learn blog, geared to keep you up to date with the latest in Microsoft certification.  Born to Learn recently highlighted MVP Justin Rodino, who will be presenting a session on Windows 7 at the upcoming Certified Career Conference on November 18th.

Finally, since I’ve spent a lot of time in airports this month, I’m finding the TSA Blog to be particularly interesting. Learn about upcoming technologies, changes in protocols and tips on packing so you can breeze through security. Maybe I’ll cross paths with you at the airport.

Tuesday, October 12, 2010

October is National Cyber Security Month

Personally, I think every month should be a month people pay attention to security online, but regardless, here are some resources and blog posts to help you think about being more secure as you navigate the world online.

First, Microsoft has a whole site dedicated to online safety, don't miss out on some tips for creating more secure passwords and using public computers.  There are even some great brochures and sheets you can print out and share at the office or with clients.

Also, check out this post by Microsoft's Worldwide Chief Security Officer, Robert Halbheer, on "Is the online world more dangerous?" He provides a link to another great handout that addresses some myths regarding online safety.

Finally, one of the most common ways that people are exposed to online security risks is by clicking on spam.  Check out a short post on managing spam by another sysadmin that works in the trenches, The UberGeekGirl.

When it comes down to it, managing your security and safety online is not all that different from managing it everywhere else.  You already keep track of your keys and your wallet, you lock your car and your house when you leave, and you don't leave your credit information around for people to grab.  Just do the same online - keep track of your passwords, don't stay logged onto web services on public computers, don't click on links that look suspicious in emails or on social networking sites and look to do business with online companies that use secure websites for transactions. 

Keep safe everyone, no matter where you are.

Monday, June 14, 2010

Phishing on your Phone

I feel like I should be sending out some kind of chain email, telling you to pass this on to everyone you care about because it’s true. But it is.

Over the weekend, someone pretty close to me received a phone call very early in the morning, claiming to be “Visa” and reporting that his Visa debit card had been deactivated due to fraud and that he needed to provide some information to reactivate it. In the blur of being woken early with a phone call and the confusion about potential fraud, he provided his card number, expiration date and PIN to the automated system.

Clearly this type of thing can happen to anyone, especially when the call comes during the early morning hours, before you might be thinking there are criminals out to get your credit card information. Just remember, your bank will never ask you for your PIN number -they will verify your identity using other information.

Since that early morning, successful phishing attempt, he made a second call to his bank and had the card canceled. Because of the quick action, no misuse of the card number or PIN had occurred.

Also, when in doubt about a call not initiated by you regarding your credit cards, inform the caller that you will call back and ask which department you should be contacting. Then hang up and call the customer service number on the back of your card.

This has been a public service announcement. Stay safe and keep an eye on your wallet.

Thursday, May 27, 2010

Making Copies!

There has been a lot in the news lately regarding the security of copier hard drives. I have to admit I haven't been thinking much about what make the inner workings of copiers and multi-function office machines tick until now. Because of this, we turned to our copy machine vendor to find out the options for the machines we have in the office.

Of course, whenever security is at stake there is a chance to make a little cash with the resolution. Our copier vendor is no exception. I'm not sure if these options have been around for a while or are recent additions, but if you have copiers or the popular network attached copier/printer/scanners, you may want to see if your vendor has similar offerings. These are for Ricoh brand machines and for our leasing plan, these options come with a monthly fee.

DataOverwriteSecurity System (DOSS) Option - To provide enhanced security for our MFPs and printers, Ricoh offers the DataOverwriteSecurity System (DOSS) for its MFP and printer products. DOSS verwrites the sector of the hard drive used for data processing after the completion of each job. During the overwrite process, the data is destroyed to prevent recovery. Additionally, DOSS also offers the option of overwriting the entire hard drive up to nine times. This feature may be used at the end of the lease or if the MFP or printer is moved to another department, and may be added before or after the initial sale.

Hard Drive Encryption Option - The Hard Drive Encryption Option meets international standard “AES 256 CBC” and provides security for information that needs to be stored on the MFP or printer and reused again. Examples of information that may need to be stored for reuse include administrator and user passwords and address books. The Hard Drive Encryption Option differs from DOSS in that the information encrypted is not destroyed, but locked up so only authorized users may access the information.


DOSS destroys data so it cannot be reused. The Hard Drive Encryption Option and DOSS may be used in conjunction and will not interfere with MFP or printer operation. In addtion, Ricoh offers a wide range of network security features such as user authentication, network communication encryption and the ability to close unused network ports.

Go forth and copy.



Wednesday, May 12, 2010

QuickBooks and Software Firewalls

I'll admit that I don't do much when it comes to tech support for small businesses, but I recently came across having to get a shared setup of Intuit Quickbooks 2010 working between two Windows 7 machines in a HomeGroup, using Trend Micro Internet Security 2010 protection for a small company.

First off, if you are using a third-party product for anti-virus/security/firewall, make sure to disable the Windows firewall. I expected Windows 7 to recognize that a firewall product was installed, but it didn't, thus the OS firewall was conflicting with the settings from the Trend Micro.

Once that hurdle had been crossed, it was time to configure the Trend Micro firewall to let QuickBooks through. I started out creating an exception for the main executiable application, but that didn't do the trick. A little research brought me to this knowledge base article from Intuit that lists out over a dozen file exceptions that need to be made. It was a little tedious to set up, but the multi-user mode of the application worked as expected once they were added.

Much safer than the work around the staff was using before - disabling the firewall whenever they wanted to work on the company finances!

Monday, April 12, 2010

Data Aggregation – Don’t Panic, Just Be Aware

I received a warning from a family member via text message a few days ago, as well as saw several posts on Facebook alerting others to a new website that “has all your personal data” – www.spokeo.com.

The advice was to go to their privacy section, enter my email address and request to be removed from the listing. According to what this family member told me about the removal process, you simply provided your email address, but only two listings could be removed with any single email address. My ears perked up a bit. Really? Interesting.

So I checked out the website with a little more of a critical eye. The site is a data aggregator, pulling data from various already public data sources – the white pages, home purchase records and the like, as well as your own public postings on Facebook, MySpace and Twitter.

The site requires payment to get the detailed results, but the teaser items include address and phone number, an estimate of your age, marital status, race, education level, possibly a few photos, lifestyle interests and median home values/income in your neighborhood.

While somewhat creepy, none of this is a big shocker. My name, address and phone number are in the white pages. The median home value and income in my neighborhood are easily searchable on www.zillow.com. As for the more personal goodies, the site indicates that it gets a good portion of its information from public profiles on Facebook and MySpace.

The hype behind all the warnings and knee-jerk reactions to “remove your listing from the site” lead me to look around for other data aggregators and compare. If you are going to remove your name from one, don’t forget several others like:

All has some similar data, though they don’t all hit the social media space as hard as Spokeo does. All have an option to pay for more detailed information and many (especially when searching for people who are known to NOT be using social media) have incorrect data.

Ultimately, data is out there and aggregation sites will take advantage, however you really have to go to the source of the data to change what it available – rushing to knocking your name off one search site isn’t going to keep it from appearing on a new site next week. And personally, I’m not excited about providing my email address for “verification” so that can be collected up for some other unknown reason.

Like I’ve said before, it’s important to control and monitor what you put online. Google yourself. Check out some of the data available on these aggregation sites. Be critical of what you click and what you share. The Internet isn’t the safest place, but most places that are interesting have some level of risk.

Finally, don’t forget it’s also important to check your credit and lock your doors, because it’s not just the folks at www.pleaserobme.com who have the ability to figure out where you aren’t.

Tuesday, February 23, 2010

Tech Triple Play in San Francisco – March 2nd

Is your schedule empty on March 2nd? If so, you can fill your day with several technology events being held in downtown San Francisco.
Start your morning with a Microsoft TechNet Event (8am-Noon) for Windows Azure, Hyper-V and Windows 7 Deployment. Get an overview of Windows Azure, look at the tools and techniques available for building virtual environments in Hyper-V version 2.0, then learn how to simplify your Windows 7 deployments.
Then for the price of an Expo pass at RSA, spend the afternoon checking out the vendors in the Exposition hall. The Expo pass also gets you the afternoon keynotes on Wednesday, Thursday and Friday.
Finally, spend the evening hanging out with the Pacific IT Professionals at their monthly meeting, held at Microsoft’s downtown office at 6pm. Be sure to check out the site for meeting information and RSVP so there is enough snacks to go around.
See you there!

Thursday, February 18, 2010

RSA Conference 2010 - You gonna be there?

If you are looking for a reason to hang out in San Francisco’s Moscone Center in early March, look no further. It’s time for the annual RSA Conference on security. With meager a beginning in 1991 with 50 attendees at their first event in Redwood City, RSA has grown to attract over 10,000 attendees annually.
This will be the 4th RSA I’ve attended, though I’ve never attended the full conference. It always looks jam-packed and awesome, but security is only a small portion of my job, thus only gets a small portion of the training dollars I can lobby for myself. So I always opt for the Expo Plus Pass.
I think the Expo Plus Pass is a great way to get a taste of the conference, attend all the keynote speeches and even pick one breakout session to attend. For just shy of $300, I think it’s a great value over the regular Expo Only Pass ($100).
RSA is being held March 1-5th and you can register here.

Friday, January 29, 2010

She’s Geeky: Day 1

Today I attended my first “She’s Geeky” unConference. I didn’t know what to expect, but after today I highly recommend checking it out if you are a woman who works in technology (or mention it to a woman you know in the math, science or tech fields).
Lots of women were willing to talk about the areas that interested them in technology, so the day was filled with a variety of topics ranging from using social media to “green” technology, programming and development to Internet privacy and identity. (I even managed to make some time to present an overview of Windows 7!)
The privacy and identity talk was lively and full of ideas about one’s online identity(s) and how managing those can be different for women for a variety of reasons. Managing online privacy is only going to get more important as data continues to be collected, stored and mined, regardless of gender.
Notes from all the sessions will be compiled and available online, so I’m looking forward to being able to recap what I’ve learned (or missed) at the end of the weekend. While not everyone does the same type of “tech” it was a great experience to spend the day with other women who were all passionate about whatever thing that made them “geeky”.

Thursday, January 21, 2010

Data Privacy Day: 1/28/10

Next Thursday, January 28th, is Data Privacy Day. It's a relatively new day of celebration - this is the third year, but the goal is to promote awareness around data privacy and stimulate new development of privacy tools and encourage compliance with privacy regulations. Several events are being held in conjunction around the US, Canada and over two dozen European countries.
As an official sponsor, Microsoft will be participating in a event held in Washington, DC. Here in the bay area, Stanford Law School will be hosting an panel on Money and Privacy that is open to the community. Also, if you are so inclined, the International Association of Privacy Professionals will be having some “Privacy After Hours” evening networking events.
If nothing else, you might want to take some time that day to review some of the publicly available information about yourself. Type your name into your favorite search engine. Double-check those privacy settings in Facebook and make sure only a limited amount of information available is to people who aren’t part of your immediate network. Consider removing your profile from social networking sites you no longer participate in regularly.
The Internet and the growth of social media has made it so much easier to stay in touch with those we care about and connect with others who share our interests. However, don’t make it too easy for others to use those tools to against you.
And one more thing – it’s probably time you changed your password.

MS ITPro Evangelists Blogs

More Great Blogs