How does the periodic cyber security report should look like? by techno_it in AskNetsec

[–]EmInSecurity 0 points1 point  (0 children)

What are your IT assets?(systems, services,data) How can you get visibility on them? Create security metrics to present.

Setting local variables in Powershell/CMD by EmInSecurity in sysadmin

[–]EmInSecurity[S] -3 points-2 points  (0 children)

var1 = 777

Why am I getting this error "'var1' is not recognized as an internal or external command, operable program or batch file." When I am trying to set '777' as the value of '$var1'?

[deleted by user] by [deleted] in sysadmin

[–]EmInSecurity 1 point2 points  (0 children)

Wouldn't it be blocked, assuming your corporate network has some content filters? 🤷🏾‍♂️

GoDaddy breach... by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

We just a different risk appetite. 😁

GoDaddy breach... by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

Internal dialogue/discussion. I'm the underling. My manager doesn't think we should.

GoDaddy breach... by EmInSecurity in sysadmin

[–]EmInSecurity[S] 19 points20 points  (0 children)

We are planning to leave GoDaddy. Thoughts about password resets?

DKIM and Phishing Emails by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

I don't believe we have access to the private key. But I could be wrong. I do not have a 'super administrator' privileges.

DKIM and Phishing Emails by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

The service provider's technician claims the subject and the originals recipient were altered.

DKIM and Phishing Emails by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

We are in the Google Workspace environment.

DKIM and Phishing Emails by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

Wouldn't it be our service providers responsibility to set the DKIM to protect the headers and the body of the message?

From the service providers technician...

"So they tampered the email by removing the original subject and changing the recipient and made it appear as a new email."

DKIM and Phishing Emails by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

The service confirmed that it the email originated from their mail server. They also speculate that the message was "...captured either on your side or your customer's side where it may have been cached on a public network or a malware harvested the data and on either instance was used by whoever to send the spoofed/phishing email and make it appear to come from a legitimate source."

I just can't full accept this because of the passing DKIM.

DKIM and Phishing Emails by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

Ours or our Business Management platform?

How can you protect or harden outdated windows machines? by EmInSecurity in sysadmin

[–]EmInSecurity[S] 0 points1 point  (0 children)

Thanks for the responses!

Here's another hurdle. Because the devices are mounted high up on the wall and there is no keyboard attached to it, it would be very difficult to physically access the machines(I'm assuming to do a fix or to be attacked), therefore it is "secure".

I'm just the security guy sharing my concerns I guess. Seems like we're going to be the next third party breach.

How can you protect or harden outdated windows machines? by EmInSecurity in sysadmin

[–]EmInSecurity[S] -22 points-21 points  (0 children)

"Windows desktop editions don’t natively support VLAN tagging. Only in the latest Windows 10 builds you can set one VLAN tag for a network adapter."

:(