Mikael Grondahl

File Server security (Part 3) – Securing your Windows File Servers

In the two previous parts of “File Server Security” (1-2), we looked at ways for you to physically secure your files servers, making it more difficult for perps to get physical access to your servers and the data, but if they still would, we would surely make them sweat a little bit before they could “enjoy” it.

We also looked at ways to minimize the attack surface by utilizing firewalls, avoiding internet connections, getting rid of unnecessary software, stopping services, malware protection and so on…

In this third and final part of “File Server Security”, we will put the final touch on our file server security recipe, for now…

Read more…

Mikael Grondahl

File Server security (Part 2) – Securing your Windows File Servers

In the first part of File Server security we covered the importance of physically protecting our file servers, preventing evil predators from putting their filthy hands on our physical hardware, trying to get access to sensitive data.

If someone would simply walk into a server room, or datacenters, grab one of the file servers and make a run for it, that would surely make physical security look a bit sloppy, don’t you think?

But now that we hopefully have that area under control, let’s look at a few more ways to make it harder for the evil forces to get access to our data.

Read more…

Mikael Grondahl

File Server Security (Part 1) – Securing your Windows File Servers

Do you remember the days when you stored everything on a file server? I’m not talking about a fancy cluster, blade server, or a virtual machine, just that one boxy piece of metal collecting dust in the corner of the cold and noisy server room?  

Well, that server might still be around you know! You may not recognize it since it’s been through a few facelifts, tune-up’s, personality changes and lost a few pounds, but it’s still there though, probably with the same name and ip-address too…

Problem is that through all these external and internal changes, one important thing was forgotten – Self-defense skills! Chuck Norris was too busy.

But it should be OK right? Nothing has happened in the last 15 years, we’ll deal with it when we’re less busy…

Read more…

Mikael Grondahl

Payment Card Industry Data Security Standard – A safety feature we all benefit from…

A few months ago, I received a call from American Express…

“Mr. Grondahl, this is Jennifer from American Express, you wouldn’t happen to be in Kuala Lumpur, Malaysia, would you? We believe someone is using your credit card there right now” 

“Thank you for your call Jennifer, I wish I was in Kuala Lumpur, but unfortunately no, I’m not”

“OK, that’s what we suspected, so we already put a hold on your credit card”

“The charges made to the card will be revoked, and we will send you a new card within 2 business days”

These guys stay on top of it for sure, got to love them for that. I’ve even received a phone call from a credit card company when trying to use my card at a gas station about 4 hours north from where I live, the neighborhood that I had to stop in was not in the best area of town, but I was pretty much flying on fumes, so not a whole lot of options there. Also, didn’t want to risk being late for my Iron Maiden concert…

So how is it that some shady people get a hold of, and try to use your credit card information?

Read more…

Mikael Grondahl

HIPAA: The Importance of Your Privacy – Part 2

We previously discussed the importance of your privacy, and the fact that we don’t want our personal health information floating around across the internet or exposed to strangers in other ways.

There’s obviously not anyone’s business when I had my latest flu vaccine shot, or any other procedures, except for my doctor or other involved medical staff.

Here’s an overview of HIPAA, examples of a couple of violations that has occurred recently, and the fines and penalties related to not following HIPAA law.

Read more…

Mikael Grondahl

Cloud Computing Demystified – Part 1

I was at a dinner party the other night, and after a while a discussion emerged about the mysterious “Cloud”, it’s interesting how many different “realities” people have about what the cloud is.

This conversation made me realize that there are quite a few misconceptions of what the “cloud” really is.

I understand that it can be a bit confusing since it contains many different components and can be utilized in a lot of different ways, depending on how and what you want to use it for.

So, I figured that maybe a brief explanation of what the cloud is, what it consists of, and who the players are, could be beneficial before the next dinner party.

Read more…

Mikael Grondahl

HIPAA: The Importance of Your Privacy – Part 1

If you have been to a doctor’s office, or a hospital within the last decade, you have probably noticed that unless you’re in a very rural area of the world, you rarely see anyone handling paper journals or records anymore. They log on to the terminal in the visiting room, fill out your information and check your records. And you wouldn’t expect anything less, since we do live in a digitalized world, right?

Read more…

Mikael Grondahl

The threat from within – Who supervises the supervisor?

All organizations constantly worry about external attackers, but truth to be told is that most threats these days come from malicious insiders. This is something that most organizations are not prepared to handle.

That insider could be your trusted colleague sitting across the desk from you, and that person may or may not even know he or she is a threat.

Read more…

Mikael Grondahl

The IT Audit – Ready or Not – Here I come…

Monday morning 8:15, you start feeling that weird sense of guilt and nervousness, you feel the beads of sweat forming on your forehead, 15 minutes left before the auditor arrives…

You ask yourself – “How long could this possibly take? What are they looking for? What if I can’t provide the answers to all their questions? Should I look for a plane ticket to a faraway country where they don’t have an extradition treaty?”

Read more…