You can't secure what you don't acknowledge.SM

Thursday, February 26, 2009

My latest security content

Here's my latest stuff....

First off, here's an article I wrote for
Using Sysinternals tools in security management scenarios (a follow-up to my previous Sysinternals article)

...and a podcast I recorded for
Mobile data protection options for enterprise CIOs (transcript included!)


Also, be sure to check out for all of my information security articles, podcasts, webcasts, screencasts and more.

Wednesday, February 25, 2009

Great backup solution for laptops

I haven't mentioned one of my favorite products lately but it deserves repeating. It's Acronis TrueImage Echo Workstation and it's a great way to backup those laptops that no one seems to be backing up. Seriously, from what I can tell in my work, if users aren't backing up their own laptops then no one is doing it. What a shame...what a gaping business continuity hole. [FYI: Acronis makes server products as well].

Anyway, if you're looking for a good solution - even if it's for users to run at home on an external hard drive you've supplied or mandated - definitely check out TrueImage Echo Workstation. I've been using it for years and it's been pretty decent all along. However the Acronis folks seem to have gotten it right with the latest version. No, it's not without its faults and instabilities but what is?

Here's a screenshot showing some of the backup options you have to choose from.
The notification options are flaky but I really like that you can encrypt the backup image files and adjust the priority while backups are running. Did I mention you can make full image backups while Windows is running and users are getting other stuff done on their system? Now if it just had a pause feature to pause backups mid-session...

Monday, February 23, 2009

Want to know what a breach is going to cost?

When writing a HIPAA-related whitepaper last week for the fine folks at (TONS of free papers and books on IT & security) I came across two good sites for calculating the cost of a data breach...VERY enlightening numbers from tools that have finally come of age.

Keep these tools in mind when you're selling security and compliance to management (I know, it's sad you even have to):

Becky Herold's Privacy Breach Impact Calculator (the original from 2003 - I've always known Becky was ahead of her time...that's why I really like working with her!)

Darwin's Tech//404® Data Loss Cost Calculator