Data Encryption Toolkit for Mobile PCs

Get tested guidance and powerful tools to help you protect your organization’s most vulnerable data. The strategies outlined in this toolkit are easy to understand, and the guidance shows you how to optimize two key encryption technologies already available to you in Windows XP, Windows Vista, or Windows 7: the Encrypting File System (EFS) and BitLocker Drive Encryption.

Click here

Technorati Tags:

Data Security in Windows Azure

Data Security in Windows Azure: Part 1
Explore the various methods and tools for securing your application data in Windows Azure including methods for securing Azure Storage accounts and data during the transition to the cloud. This video also covers protocols for securing requests to, and responses from, Azure Storage, platform-provided methods for ensuring data integrity, and cryptographic pubic key distribution between Azure roles and Azure Fabric Controller.

Data Security in Windows Azure: Part 2
Learn how to make your Azure Storage container and blob items URL-addressable in a secure fashion, including the setup of permission structure on the URLs, generating hashes to secure individual items and containers, expiration and revocation of storage hashes and keys, and auditing access to the store.

How to Configure SQL Azure Security
Familiarize yourself with security within SQL Azure with demonstrations on the creation of logins, databases and users and information about sys.sql_logins and sys.databases, which allow the display of logins and databases from the master database

How to Configure the SQL Azure Firewall
The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.

How to Configure the SQL Azure Firewall
The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.

Technorati Tags:

Microsoft Security Resources

New Version of Microsoft Security Compliance Manager (SCM) Version Now Available
Now updated to work reliably behind corporate proxy servers; Microsoft SCM v.1.1.2 also features security baselines for Windows 7, Microsoft Office 2010, Windows Server 2008 R2, and Windows Internet Explorer 8. Download the latest version of this free tool and starting moving toward more effective security and compliance processes for some of the most widely-used Microsoft products.

Securing Client Access Servers in Exchange Server 2010
Learn how to manage security and authentication related options available for a computer running Microsoft Exchange Server 2010 that has the Client Access server role installed.

Hardening SQL Server for SharePoint Environments
Get a summary of hardening recommendations then specific details on how to configure a SQL Server instance to listen on a non-default port, how to configure and test a SQL client alias, and much more.

BranchCache Security Guide
Get comprehensive guidance on how to manage the security of the Microsoft BranchCache feature introduced in Windows Server 2008 R2 and Windows 7.

Securing Windows Server
Get a consolidated view of the feature overviews, step-by-step-guides, and configuration tips for the various security and protection technologies in Windows Server 2008 and Windows Server 2008 R2 from authorization and information protection to security management and network security.

Windows Server 2008 and Windows Server 2008 R2 IT Compliance Management
Download the IT Compliance Management Series to access free tools and guidance to help you configure Windows Server 2008 and Windows Server 2008 R2 to address specific IT governance, risk, and compliance (GRC) requirements.

Security Tip of the Month: Using the Enhanced Mitigation Experience Toolkit to Safeguard Against Zero Days
There have been a number of zero-day vulnerabilities circulating around the Internet recently. Find out how the Enhanced Mitigation Experience Toolkit (EMET) can help you manage security mitigations for your systems.

And do not forget for the Home user if they get Virus, Malware or failed security up date they get free support by calling 1-866 PCSAFETY

 

Windows 7 Development Boot Camp

For the Win: Windows 7 Development Boot Camp
January and February 2011
Web and cloud may be all the rage, but many developers are still doing hardcore client development. If you are among them, this Boot Camp is for you. In this full-day event, we will explore how to maximize your impact on the Windows client. Interactive sessions will include topics from throughout the Windows development platform. We will look at application compatibility and transitioning your applications to Windows 7, integrating with the Windows Taskbar, developing for Internet Explorer 9, utilizing the cool functionality in the Sensors and Location Platform so that your application better responds to its current environment, and leveraging multi-touch capabilities.
Click on your desired city below to register:

Cross Post from Microsoft

 

Technorati Tags:

Bulk exam vouchers with free exam retakes

Save 15% on Microsoft Certification For Your IT Team
Organizations with more certified staff see a 10% increase in on-time and on-budget deployments. Microsoft Certification can help ensure your IT team has the qualifications to deploy, use, and manage Windows 7. Learn how you can save 15% when you purchase a 10-pack of Microsoft Certification exam vouchers with free exam retakes for your team.

 

Technorati Tags:

New Springboard Resources

Deploying the Core Optimized Desktop Using the Microsoft Deployment Toolkit (MDT)
Get step-by-step guidance on how to use MDT 2010 to automate the installation and configuration of the core Optimized Desktop technologies: Windows 7, the Microsoft Desktop Optimization Pack (MDOP), Forefront, and Microsoft Office 2010. Guidance on deploying the core Optimized Desktop using System Center Configuration Manager 2007 R2 is also available.

Local P2V Migration Using MDT 2010 and Sysinternals Disk2VHD
Find out how to use MDT 2010 and Sysinternals Disk2VHD to redeliver users’ old desktops as fully functional virtual machines. Following these steps can provide a safety net by enabling continued access to users’ previous computing environment during Windows 7 deployment.

Updated: Windows 7 Application Compatibility List for IT Professionals
Download this Microsoft Office Excel-based spreadsheet for a list of software applications that have met Windows 7 Logo Program testing requirements for compatibility with 32-bit and 64-bit Windows 7. This list includes applications with the following compatibility statuses: "Compatible," "Free Update Required," "Paid Update Required," "Future Compatibility," and "Not Compatible." These statuses are based upon the software publishers’ statements of compatibility.

Go to Springboard site for Lots of great information click here

 

Phishing how to protect yourself

Phishing is  method that criminals use to steal you identity online. It uses email and fraudulent websites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information.

Phishing send millions of fraudulent email messages with links to fraudulent websites that appear to come from websites you trust, like your bank or credit card company, and request that you provide personal information. Criminals can use this information for many different types of fraud, such as to steal money from your account, to open new accounts in your name, or to obtain official documents using your identity.

Prevent ID theft from phishing scams do the following to help protect yourself from phishing scams:

  • Don’t click links in email messages.

 

  • Type addresses directly into your browser or use your personal bookmarks.

 

  • Check the site’s security certificate before you enter personal or financial information into a website.

 

  • Don’t enter personal or financial information into pop-up windows.

 

  • Keep your computer software current with the latest security updates.

If you suspect that you’ve responded to a phishing scam with personal or financial information, do the following;

  • Change the passwords or PINs on all your online accounts that you think could be compromised.

 

  • Place a fraud alert on your credit reports. Check with your bank or financial advisor if you’re not sure how to do this.

 

  • Contact the bank or the online merchant directly. Do not follow the link in the fraudulent email.

 

  • If you know of any accounts that were accessed or opened fraudulently, close those accounts.

 

  • Routinely review your bank and credit card statements monthly for unexplained charges or inquiries that you didn’t initiate.

How do I report a possible phishing scam?

  • Internet Explorer. While you are on a suspicious site, click the Safety button or menu in Internet Explorer 8 and point to SmartScreen Filter. Then click Report Unsafe Website and use the webpage that is displayed to report the website.

 

  • Windows Live Hotmail. If you receive a suspicious email that asks for personal information, click the check box next to the message in your Hotmail inbox. Click Mark as and then point to Phishing scam.

 

 

The Bottom Line THINK if you not sure do not respond even better do not open the email….

Technorati Tags: ,

Web talks that I am doing

As an IT professional, you deal with securing operating systems, patching software, and installing and configuring firewall and routers on a daily basis," said Ferron. "But what about the physical infrastructure? Do you understand how simple techniques can allow theft of your company resources? In this webinar, we will discuss one of the most important yet least-considered areas of security by IT professionals."

Webinar: Understanding Cyber Security Physical Security

Live Presentation: Wednesday, December 1, 2010, 12:00-1:00 pm EST

Ferron will also host "Understanding Cyber Security Patch Management" at 12 pm EST Wednesday, December 15. In this hour-long webinar, attendees will examine the area of systems management that involves acquiring, testing, and installing appropriate patches to administered systems.

"In this session, we will develop an actual process to secure hardware and software systems using a fictional company," said Ferron. "We will discuss automated systems versus manual systems, as well as incorporating virtualization and an audit process for patch management."

Webinar: Understanding Cyber Security Patch Management

Live Presentation: Wednesday, December 15, 2010, 12:00-1:00 pm EST

Register for Understanding Cyber Security Physical Security and Understanding Cyber Security Patch Management on the Global Knowledge web site. Recorded versions will also be available.

Browser Has Been Hijacked ?

  • Home page or other settings change on your computer. Links are added that point to websites that you’d usually avoid.
  • You can’t navigate to certain web pages, such as antispyware and other security software sites.
  • A seemingly endless barrage of ads pops up on your screen.
  • New toolbars or Favorites are installed that give you icons and links to web pages that you don’t want.
  • Your computer runs sluggishly. Malicious software can slow down your computer.

The following six tips can help restore your browser’s settings:

  1. Stop cascading pop-up windows. If endless pop-up windows appear on your screen, you’ll probably want to stop them first. To do this in Microsoft Windows 7, Windows Vista, Windows XP, or Windows 2000 while using Internet Explorer:
    • Press CTRL+ALT+DEL, click Task Manager, and then click the Processes tab.
    • Click IEXPLORE.EXE, and then click the End Process button.

    This closes all instances of Internet Explorer. Then you can re-open the program to continue browsing as usual. To help prevent future attacks, you should also have a pop-up blocker turned on.
    To turn on the pop-up blocker in Internet Explorer 8 click the Tools button (the gear icon), point to Pop-up Blocker, and then click Turn On Pop-Up Blocker.
    To turn on the pop-up blocker in Internet Explorer 7:

    • Click Tools menu, click Internet Options, and then click the Privacy tab.
    • In the Pop-up Blocker box, select the Block pop-ups check box. Click OK.

    If you still experience the other effects of a hijacked web browser, try the following:

  2. Install Microsoft Security Essentials or another antivirus and antispyware program. Microsoft Security Essentials is free software that will help protect your computer from malicious software such as viruses or spyware. Many browser hijacking programs can be identified and removed by downloading, installing, and running Microsoft Security Essentials or a similar tool.
  3. Run the Malicious Software Removal Tool . This can catch some, but not all, kinds of hijacking software.
  4. Reset Internet Explorer settings. If you’re using Internet Explorer and your home page has been changed, you can often reset it yourself.
    Note If you use Microsoft Security Essentials, Forefront Client Security, Windows Defender, or the Windows Malicious Software Removal Tool and these tools have detected and removed hijacking software from your computer, these tools might change your home page and your search page to help protect against the malicious software.
    For more information and step-by-step instructions, see How to restore your Internet Explorer home page and search page preferences.
  5. Disable add-ons. Many browser hijackings come from add-ons, also known as ActiveX controls, browser extensions, browser helper objects, or toolbars. These items can improve your experience on a website by providing multimedia or interactive content, such as animations. However, some add-ons can cause your computer to stop responding or display content that you don’t want, such as pop-up ads.
    To learn how to disable add-ons in Windows Vista or Windows XP Service Pack 2 (SP2), read How do browser add-ons affect my computer?
  6. Get more help.  call 1-866- PC safety
  7. go online to  Here let system try and fix these issues for you.

This is a combo of article posted on the Microsoft site.