There has to be a different approach to data breaches and data losses. Consumers have become complacent in breach after breach. Companies should be advocating their controls and abilities.
Blog Archive
0
Security Links
Helpful Microsoft Security Links Top Trends in cyber security 10 Immutable laws of security NIST Controls 800-53
0
SQL Users with matching passwords
use MASTER go SELECT [name],[type_desc],create_date,modify_date,password_hash FROM sys.sql_logins WHERE PWDCOMPARE(lower([name]),password_hash)=1 –Note: Have experienced where case matters or PWDCOMPARE(upper([name]),password_hash)=1 or PWDCompare([name],password_hash)=1 order by [Name]
0
SQL Login Trigger
Purpose: Enables auditing of logins on a server. Steps: Download the attached script Run the script Create Login Trigger
0
NIST updates Cybersecurity Framework
It’s a big day, NIST has released their much anticipated Cybersecurity Framework, version 1.1 is now available here: https://www.nist.gov/cyberframework Credit: N. Hanacek/NIST