A better, safer admin user for AWS

If you use AWS, you probably have a root user and one or more administrator users. If you are following best practice you have secured all logins with MFA, and you rarely if ever use the root user. Instead, you log in as one of the administrator users. The problem with that is that as long as you are logged in, you can do anything – including make disastrous mistakes. Wouldn’t it be nice to have all the power of an administrator at your fingertips, but only when you actually need it?

Continue reading

Two-factor authentication – do it now.

The online world has become too dangerous for us to keep protecting ourselves with no more than a username and a password. Especially when most of us choose stupidly simple passwords. Even if you choose a good one – upper and lower case, special characters, letters and numbers – you now need such a long one that no human can remember it. Tools like LastPass are great, but only if you also use ridiculously long passwords. Pretty much the best protection you can give yourself is a simple thing called two factor authentication. It’s simple, it’s free, and it’s very effective.

Continue reading

The cure for darkness is light. Not more darkness.

The matter of data centre security was raised recently on a network mailing list I subscribe to. Someone was wondering if data centres checked incoming equipment for “bad stuff” – explosives and what-not.

The reaction from some was “don’t talk about that, we don’t want to give people ideas”. What a muddle-headed response!

Continue reading

Trojans and ransoms and backups, oh my!

Data loss can be a business killer. There’s a simple test for how badly you need good backups: Imagine all your computers are irrecoverably gone. Just – gone. Did you shrug? Gulp? Or clutch your chest? If the last, you need good backups 🙂 Now let me tell you about ransomware, trojans and backups… Continue reading

Malware and the question that never gets asked

Just read this article on the ABC website, about securing your enterprise against malware. They gave great advice – “detect and block at the perimeter and inside the network”, “assess and protect endpoints”, “analyse threats through context”, “eradicate malware and prevent reinfection”, “remediate attacks with retrospective security” and “be sure to implement integrated rules on the perimeter security gateway”. But one important bit of advice was missing.

Continue reading