Honeypots and SCADA Systems

Guest Blog by Rusty O’Neal System Specialist/SCADA Admin, Canoochee EMC and Secretary, GEMC Distribution Transmission Automation Group (DTAG) "A honeypot consists in an environment where vulnerabilities have been deliberately introduced in order to observe intrusions and attacks"(Pouget & Dacier, 2004, p. 2). The great thing about honeypots is that you can put them into any environment to observe malicious traffic. This could be used to monitor traffic locally or a wide area. Honeypots have been used for over twenty years now to watch for such traffic. The great thing about using a honeypot is that it is used to set a trap to detect, deflect, and in some manner counteract unauthorized access. A honeypot looks just like any other network including computers, data, and a network site that appears to be part of the corporate network, but is actually put in place to be closely … [Read more...]

Creating a 2010 Outlook Signature with Hyperlinks

Want to jazz up your email signature in Outlook 2010? Add social media links to your email signature for LinkedIn, Facebook, Twitter and your blog. You can make a hyperlink to your social media sites so mail recipients just "click" right to them. Follow these simple steps to add your signature. Get your logos. You will need your company logo and logos for the social media sites to hyperlink. There are many logos to choose from that are in the public domain. If you want to use a logo that requires payment or special permission, make sure to satisfy all requirements before using. Get your hyperlinks. Go to each of your social media sites and cut/copy the links to that site. Be sure that you use the links that do not require login to the site. For instance, when you login to Twitter your homepage is: http://twitter.com/home. For others to see you, use the link to your account. For … [Read more...]

Top IT Trends for 2013

In keeping with our new year’s tradition, we have compiled our list of the top IT trends for 2013. We scanned the available data, reviewed our previous predictions and focused on the explosion of processing power for mobile devices. This year will be interesting for tablets and all touch devices as we find new ways for computers to be an extension of the human experience. Everything goes Mobile – It’s not just smart phones and tablets leading the charge for mobility.  Everything we do for business and personal will be mobile.  From storing data to updating our social sites to every type of paperwork imaginable will be done with the help of our mobile devices. This need for mobility will fuel Cloud services and applications.  Look for things you never expected to do on the go and add them to the list of mobile activities. The Cloud is up close and personal – This is one of the IT … [Read more...]

Document Management: Why Now?

By guest blogger: Greg Schloemer, President, DocuWare Corporation  Businesses of all sizes are being impacted by the economic down-turn; budgets are being cut and capital investments eliminated.  The question is why would a customer consider investing into a document management solution during these tough economic times? There are three areas that are of particular interest and concern for a customer. The first is managing money and cash flow more efficiently. The second is retaining customers and improving relationships to encourage more repeat business. The third is in the event of a reduction in personnel, that the appropriate procedures are in place and work effectively to limit legal exposure. By automating business processes using document management (workflow) internal procedures are maintained, while at the same time productivity, accuracy, and quality are improved. One … [Read more...]