Search This Blog

Thursday, March 3, 2016

Meet the Man Who Keeps Microsoft Safe and Secure

As the chief security officer for Microsoft, Mike Howard has more than a passing interest in the things he sees on the nightly news. Whether it's an uprising in the Middle East, the ongoing threat of terrorism or a natural disaster somewhere in the world, the former CIA officer is prepared for the impact various events could have on his company and its employees.
"Cybersecurity is a big issue on everyone's mind as we've become more globalized as a society and businesses have expanded their footprints and everything is digital," Howard said. "But, traditional security issues of theft, violence against employees, terrorism and natural disasters are all still paramount in terms of being the big security challenges for businesses."
This is especially true when your company is so large and so much in the public eye. Howard's security team is ultimately responsible for the safety and security of Microsoft's entire executive team, its 90,000 employees, roughly 90,000 contractors, 700 facilities in more than 100 countries worldwide and all of the visitors to those facilities. He's also responsible, of course, for all of their computers and hardware and the information it they contain.
The Microsoft security teams deals with threats of violence against executives and employees, employee violence, kidnapping threats, terrorism, natural disasters, property theft and, peripherally, intellectualproperty protection (which also falls under the purview of a separate, cybersecurity group at Microsoft).
Security "evangelist"
In Howard's time at the company, the security team has had to evacuate employees from Beirut and the Ivory Coast, has contracted forensic psychologists to examine threatening letters and regularly provides emailed safety information and warnings to all employees who travel overseas.
But it may be his role as an "evangelist" for the company's physical security business group that looms the largest in Howard's job description. Finding ways to communicate and demonstrate the importance of security — both physical and cyber — to the company's executives is the linchpin of developing a security program that manages to keep such a large and public company running smoothly, he said.
"A lot of [Microsoft's commitment to security] has to do with the evangelizing of security on several fronts within the last decade," Howard said. "My IT securitycounterpart and I have worked diligently to really get the movers and shakers, the decision makers here to understand security and to support those security efforts and the pushing down of that message throughout the enterprise."
Howard believes that his work driving home the importance of both physical and cybersecurity is part of the reason that Microsoft's company culture has come to reflect those values.
"We brief all new corporate vice presidents on security, we bring senior executives to the Global Security Operations Center in Redmond, [Wash.] and show them what technologies we employ to keep the company safe," Howard said. "We're not just guys checking doors and responding to emergencies."
Howard believes that Microsoft has come to understand what many companies never do: That cyber and physical security is integral to the company's overall business, and even its marketing plan.
"Security is important to the entire company," he said. "Intellectual property could be compromised and it can affect the company's brand reputation or lead to lawsuits," Howard said. "This realization led to cultural shift with company becoming more security conscious."
Employee assistance
To facilitate the rollout of solid security plans throughout the company, Howard's team has had to essentially deputize every employee to be the eyes and the ears of the company. Microsoft does that with a formal training program.
"Having a training program in place is essential to any security program," Howard said. "Without it, you don’t have a well-rounded security program. We have a certain amount of full-time employees and vendors to cover Microsoft globally; we could never cover the world adequately without educating and creating awareness programs that teach people what to look for."
Today, regular Microsoft employees are instructed to stop a stranger entering a building and ask to see their badge.
"That never would have happened ten years ago," Howard said.
Howard said that good security also involves working with the company's human resources department, which offers employee assistance programs that can help workers in difficult times and potentially prevent an employee problem from becoming a security threat.
"A robust employee assistance program is very important to security issues," he said. A bad economy, problems at home, even dealing with a sick relative can be things that can trigger security issues at work and having a team in place to help solve those problems can prevent them from ever turning into an incident of violence or theft, he said.


Small Business Cyberattacks Getting More Creative

CREDIT: Cyber attack image via Shutterstock 
Small businesses, government organizations and even online gamers were targeted last month by cybercriminals, new data shows.
Conducted by GFI Software, the study examined the most prevalent threat detections encountered in January, which included phishing emailsaimed at small business owners. The emails posed as notices from the Better Business Bureau and claimed a customer had filed a complaint against the recipient, but the notes actually contained links to malware created with the Blackhole exploit kit.
A number of government organizations were targeted by spoofed messages from the United States Computer Emergency Readiness Team, while gamers looking to score pirated release games [TK – What are release games? Do we mean access to these games before they are released?] fell victim to several different attacks that offered bogus beta invites in return for filling out surveys and recommending links on Facebook and Google+.
Chris Boyd, senior threat researcher at GFI Software, said anyone on the Internet is a potential target for cybercriminals looking to infect systems and scam users.
"They purposefully cast a wide net when picking their methods of attack in order to reach as many targets as possible," Boyd said. "Whether you are a young gamer, a successful business owner or a government employee, you need to be wary when clicking on links that appear to pertain to your interests, especially when asked to submit personal information online."
Malware writers and Internet scammers also sought to attack a wider cross-section of the population by creatively piggybacking on hot news topics and highly trafficked websites. An example is the shutdown of the file-hosting website Megaupload, which led to a domain typo scam targeting both regular users of the website and visitors interested in seeing the FBI notice posted on the site. Once victims reached the misspelled URL, they were redirected to various sites promising fake prizes and seeking personal information.
"While cybercriminals may not be picky about their choice of victims, their choice of tactics is anything but haphazard," Boyd said. "Cybercrime campaigns are designed to cripple systems and steal personal information."


Saturday, November 15, 2014

Tips To Become A CEO Before You are 30


my smart leap
Connect with us fb twitter
Career Tips
Humor
Job Search
Resume
6 Tips To Become A CEO Before You are 30
ceo
Posted on Career Tips | October 27, 2014
Ever wondered why names like Mark Zuckerberg, Richard Branson, Larry Page and Sergey Brin are denoted as synonym to success? Because other than enjoying an overdose of success today, they all had an early-age successful career. Read More>>
How To Fix Your Derailed Career And Change It Into Something You Love To Do
derailed career
Posted on Career Tips | October 27, 2014
Believe it or not, all of us are at some point in our life and  feel that the kind of job we have fortunately or unfortunately bumped into may not Read More>>
9 Deadly Resume Mistakes That Can Cost You A Job And How To Avoid Them
deadly resume
Posted on Career Tips | October 27, 2014
Resume writing is easy, right? After all, all it demands is to dump your achievements and past experiences in a word document and voila! Read More>>

Tuesday, October 29, 2013

Extend your Wi-Fi network throughout the house

                                         Extending a Wi-Fi network can be as easy as playing with cardboard and tape, or as difficult as rewiring your house. It all depends how big a boost you need, and how much time and money you're willing to devote to the task.
Here are three ways to increase your signal's range.

Boosters

You know those little antennas that screw onto your router? You can improve the signal by replacing them with bigger antennas, or more directional ones.
You can also improve the existing antenna, making it directional. All you need is a few minutes and some common household materials. See Extend Your Wi-Fi Range With a Parabolic Reflectorfor detailed instructions.
If you're not the do-it-yourself type, or if you need to boost the signal in all directions, you can buy a generic antenna for a few dollars. I've seen this same antenna (see image to the right) sold under different brand names--priced from $2 to $7. And yes, I've tried it and it helps…a bit.
For a more powerful boost than either of those, try the directionalTP-Link TL-ANT2409A. You can get it for $25 if you shop around.

Extenders

You plug one of these devices, also called repeaters, into a wall socket as far from the router as you can get and still receive a good signal. The extender picks up the signal and rebroadcasts it.
In general, I find these more effective than boosters. But they're also more expensive, and are trickier to set up, since you have to find the best location and connect them to the network.
The best one I've tested (and I haven't tested all that many) was theAmped Wireless REC10. If you look around, you can buy one for $70.In general, I find these more effective than boosters. But they're also more expensive, and are trickier to set up, since you have to find the best location and connect them to the network.

HomePlug

I used to be a fan of this technology, which carries network data over your house's electric wiring. The adapters are basically power bricks with Ethernet ports. Some also have Wi-Fi Antennas.
You won't have much trouble adding HomePlug to your network--you just plug it in and it works…if it works.
All sorts of things can interfere with HomePlug signals--wiring, the location of the washing machine, the type of light bulbs you use.
I used HomePlug happily for years. It didn't give me Ethernet speed or even 802.11n speed, but it was faster than my Internet connection and that was all that I needed. Then it just stopped working.




Thursday, October 3, 2013

Remote Network Access: Objectives and Architecture

In the this mini-series of posts, I am going to diverge from my usual System Center-only focus to take a fresh look at deploying a Microsoft Remote Network Access solution. First, we'll get you online and working using SSTP, and then extend this base implementation with Network Access protection before finally coming back a little later and elevating these SSTP servers to Direct Access.

Why Remote Network Access?

So why I am doing this? As we build out solutions for System Center, we need a foundation from which to work, and within the latest versions of Configuration Manager we have the ability to integrate with the Windows Network Access Protection and manage our off-site computers with a dial out approach over Direct Access. Also, in the new R2 releases we can integrate both our Certificate Servers (Certificate Authority – CAs) and we finally have the ability to distribute VPN Profiles to our end users. Therefore, I am considering this miniseries as a foundation for illustrating these features and abilities in later posts.
I am building this solution out using the recently published RTM builds of Windows Server 2012 R2, but almost everything I will cover in this series will work from 2008 R2, with some minor adjustments and wizard changes.

Architecture

The environment which we will use for the scenarios is illustrated in the graphic below, showing our client establishing a connection with the RRAS server over TCP443 or what you might better recognize as the HTTPS port. SSTP utilizes this same supporting environment, including the SSL certificates used to protect the tunnel.
I have tagged a number of the components with a  to indicate the initial systems which are engaged in the basic SSTP implementation, including the Network Policy Server (otherwise known as RADIUS), which is used to check the client's authorization to proceed with establishing the requested tunnel.
The remaining servers are added to the scenario as we enable the NAP services, including the Certification Authority, and as an example, a simple Windows Update Server to offer simple remediation to non-compliant clients.

Each of the servers are responsible for different roles in the overall solution. To get a brief understanding of what these are, let's take a quick look at their primary functions.
  • NPS Server – This hosts the Network Policy Services and Network Access Protection services. This server can also be referred to as the Radius Server. When we extend the solution with support for Network Access Protection, we will add a second role to this server called Health Replication Authority (HRA), which will connect to our Certificate Server to request and Issue health certificates
  • SSTP Server – This server hosts the actual Routing and Remote access installation. It will be configured to primarily offer SSTP-only tunnels, and it will connect to the NPS server for authentication and accounting (storing auditing) information, with the purpose of determining if the clients are indeed permitted to establish the tunnels
  • CA Servers  These host PKI certificate templates and issues certificates based on these templates to our systems. It is also responsible for issuing the Health Certificates via the Health Responsibility Authority. We will need to actually create the templates for these Health Certificates as part of the deployment.
  • Client Computers – These are domain-joined machines that will subscribe to the new SSTP service that we are implementing. SSTP is supported from Windows 7 and newer versions of the client. Non-domain-joined machines can of course work with SSTP, but for the scope of this mini-series I am focusing on domain-joined systems.

We now have the background and an idea of how the different servers will be used. Our next objective will be to implement this solution. Now would be a great time to get your environment ready and spin up some servers for the jobs we are about to face.