You can't secure what you don't acknowledge.SM

Wednesday, September 21, 2011

Buying, selling & consigning used hardware great for IT budgets

In IT and information security we're required to come up with creative ways to save money any way we can. Well, how about this novel idea: buy used network and computer hardware, or sell what you've already go so you can upgrade.

A good friend of mine works at a company (Riverside) that does just that. They buy, sell and consign used network and computer hardware to help businesses save (or make) money. If you're looking to "earn" some budget dollars, Riverside will buy your equipment from you - apparently something that most used hardware brokers/sellers don't do.

Is it just me...why aren't we seeing more of this in today's "green" world. You won't find me kneeling at the altar of "global warming" but I most certainly believe in recycling and buying used wherever possible. It helps the environment and seems like an ingenious way to save IT dollars already budgeted and, if selling, actually add some dollars to the bottom line.

Never forget that the people who add the most value in and around IT are the ones who will ultimately rise to the top. Buying and/or selling used network and computer hardware seems to me to be a great way to go about doing so. Just some food for thought.

Tuesday, September 20, 2011

Pick up that paper at your own peril

From @Quotes4Writers on Twitter, this totally reminded me of me:

"You have to be brave to take out that white sheet of paper and put on it words that could be
evidence of your stupidity." - Sol Saks

Monday, September 19, 2011

Windows ASLR, APTs, server malware protection and common patching gaps

Here are some new pieces I've written for the TechTarget sites SearchWindowsServer.com and SearchEnterpriseDesktop.com on Windows (in)securities in the enterprise including a bit on the over-hyped and misunderstood APT threat (is that like "ATM machine"?) which I got to see first hand while working on a project that involved one of the Operation Shady Rat victims:

The APT threat to Windows environments

Why you need address space layout randomization in Windows Server 2008 R2

Are you properly protecting your Windows servers against malware?

Windows server patching gaps you can't afford to miss

Enjoy!

As always, be sure to check out www.principlelogic.com/resources.html for links to my additional information security articles, whitepapers, podcasts, webcasts, books and more.