Spate of shocking cyber attacks on universities jolt academia

0

It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States and other parts of the world. If the cyber attacks of the past few weeks are any indication, universities are now facing the biggest threat to information security.

Attack landscape

  • On July 17, 2013, personal information of more than 72,000 staff members (past and present) of the University of Delaware in Newark was compromised. Hackers  obtained the information (names, addresses, social security numbers, etc.) by exploiting the vulnerability in a third-party software that the university used.
  • On July 18, 2013, during a routine security sca

Your Net Worth Is Online – And Less Safe Than Ever

0

The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the brightest minds in IT security each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities. And not a second too soon, since every week seems to usher in another security catastrophe.

This week’s shocker was the outing of a hole in mobile device SIM cards, by Karsten Nohl, the founder of Security Research Labs in Berlin. Nohl was able to send a virus to the SIM card through a text message, then eavesdrop on calls, make purchases through the phone and even impersonate the phone’s owner. He did all this in under two minutes using an everyday PC and estimate…

IT outsourcing: When outsiders become insiders, how do you ensure information security?

0

Organizations outsource a part or whole of their IT services to third-party service providers for various reasons, such as cost savings, leveraging outside expertise, need to meet business demands quickly, and other critical aspects. Usually, tasks such as software development, network management, customer support, and data center management are outsourced.

Engineers and technicians working with service providers would require remote privileged access to servers, databases, network devices, and other IT applications to discharge their contractual duties. Typically, in outsourced IT environments, the technicians working with the service provider will be located at a faraway place and will …

How companies can implement Internet fair use policy for corporate users?

0

Internet fair use policy or acceptable use policy defines the appropriate Internet usage behavior expected from employees in their workplace. The policy aims to protect the employees as well as the companies IT infrastructure from malicious threats, inappropriate content, and corporate bandwidth draining web applications, all of which ultimately affects the productivity and competitiveness of the company as a whole.

To add tooth to the ‘written policy’ companies should have tools in place to enforce the policy in letter and in spirit. Companies use non-intrusive and real-time network security monitoring software’s like ManageEngine Firewall Analyzer to implement the Internet fair u…

ManageEngine Thoughts: Software Defined Networking #1

0

With Software Defined Networking (SDN) being the new industry buzzword, more and more people including network architects, CIOs and CTOs have started exploring SDN and its capabilities to cater to the growing demands of enterprise and cloud services. Google statistics show there has been an exponential increase in search numbers for Software Defined Networking in recent times.

This industry interest has triggered a wave across networking giants to tag “SDN” for marketing mileage,

Some things in life can never be fully appreciated nor understood unless experienced firsthand. Some things in networking can never be fully understood by someone who neither builds commercial networking equipment n

Bridge the gap between IT Operations & IT Security

0

Traditionally, IT operations and IT Security have remained at loggerheads. IT operations team is tasked with the responsibility of carrying out the the day-to-day activities, maintaining the software and hardware inventories, ensuring reliability, optimizing performance, capacity and utilization of the network and a host of other activities. They always need to respond to business requirements at the quickest time possible, keeping in mind business continuity.

IT Security, on the other hand, is tasked with the responsibility of safeguarding the business from evolving, sophisticated cyber-threats and ensuring compliance to regulations. To reduce risks, IT security enforces processes and pl…

FacilitiesDesk Hotfix 6502 Released!

2

Dear Users,

We are glad to release the HotFix build #6502 for ManageEngine FacilitiesDesk.

Existing users (from Build number: 6501) can apply the Hotfix 6502 from the following link:

http://www.manageengine.com/products/facilities-desk/49448464/AdventNet_ManageEngine_FacilitiesDesk_6_5_0_SP-1_0_0.ppm
(or)
http://www.manageengine.com/products/facilities-desk/service-pack.html

Follow the below instructions to apply the Hotfix:
http://www.manageengine.com/products/facilities-desk/service-pack.html#sp

New users can directly download the exe/bin file of the product from the following link:
http://www.manageengine.com/products/facilities-desk/download.ht

FacilitiesDesk Hotfix 6501 Released!

0

Hi Folks,

Here is the latest release of Hotfix from ManageEngine FacilitiesDesk.

Existing users (from Build number: 6500) can apply the Hotfix 6501 from the following link:

http://www.manageengine.com/products/facilities-desk/49448464/AdventNet_ManageEngine_FacilitiesDesk_6_5_0_SP-0_1_0.ppm
(
or)
http://www.manageengine.com/products/facilities-desk/service-pack.html

Follow the below instructions to apply the Hotfix:
http://www.manageengine.com/products/facilities-desk/service-pack.html#sp

New users can directly download the exe/bin file of the product from the following link:
http://www.manageengine.com/products/facilities-desk/download.html


What&#

Preventive Maintenance and FacilitiesDesk

1

Preventive maintenance is a systematic way of checking and repairing a asset, equipment, machine or vehicle. Asset life can be significantly extended by simply tightening screws, cleaning, lubricating and replacing parts that show wear. Most of the equipment manufacturers design a specific preventive maintenance checklists for maintenance professionals to follow when they take the equipment down for maintenance.

Preventive maintenance is usually outlined in instruction manual or maintenance checklist. In most of the preventive maintenance checklist the first step would be cleaning the exterior and interior of a equipment. Cleaning, lubricating and tightening are the three important steps i

Maintenance Planner Checklist

0

Simple checklist for maintenance planners

  • Check for duplicate work orders
  • Check whether it affect any other work orders
  • Check equipment or asset number
  • Check parts availability
  • Work location should be clearly mentioned in work order
  • Description of work needed to be carried out should be mentioned clearly
  • Is there a standard work order for this job
  • Check for the complete material list required for the work is included in work order
  • Are all safety issues adequately covered
  • Check for safety materials included in the materials list
  • Is Engineering assistance required
  • Are all trades or skills required to complete the work included on the work order