6 reflections on the key role that system administrators play

Information Management Resources

In recognition of July 27 as System Administrator Appreciation Day, six technology executives share their thoughts on why these professionals are so vital to the organization. Hardware and software Data management Data types

The right way to migrate to the cloud: All in, but with the right tools – New white paper

Quest Software

Learn the right way from this DCIG paper on system administration practices and performance monitoring tools.( Going all in to migrate to the cloud? read more ). Foglight Foglight for Virtualization

Boosting Security Effectiveness with 'Adjuvants'

Dark Reading

How integrating corporate resources like the IT help desk, system administration, quality assurance and HR can breathe new life into your security program

PyRoMine Uses NSA Exploit for Monero Mining and Backdoors


Not just a miner, the malware also sets up a hidden default account with system administrator privileges, to be used for re-infection and further attacks. Malware backdoor EternalRomance follow on attacks Monero pyromine remote desktop ShadowBrokers smb1

Simplify records management while improving information governance

OpenText Information Management

Challenge: Your organization has many users involved in the lifecycle management of important information assets–from knowledge workers to legal associates to system administrators and, yes, Records Managers.

Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

Thales eSecurity

He suggests that protecting data that is on your system should be the focus. In other words, a system administrator should be able to maintain the system without seeing what is in the files he is backing up or transferring.

A Russian cyber vigilante is patching outdated MikroTik routers exposed online

Security Affairs

Alexey is a Russian-speaking cyber vigilante that decided to fix the MikroTik routers and he claims to be e system administrator. A Russian-speaking hacker, who goes by the name of Alexey, claims to have hacked into over 100,000 MikroTik routers with a specific intent, disinfect them.

Mining 101

Thousands of RDM refrigeration systems exposed online are at risk

Security Affairs

Experts from Safety Detective discovered thousands of refrigeration systems made by Resource Data Management (RDM) exposed to remote attacks. Systems exposed online could be accessed via HTTP on ports 9000, 8080, 8100, or 80. SecurityAffairs – refrigeration systems, hacking).

Risk 90

Google will shut down consumer version of Google+ earlier due to a bug

Security Affairs

No third party compromised our systems, and we have no evidence that the app developers that inadvertently had this access for six days were aware of it or misused it in any way.”

How to start your career in cyber security

IT Governance

Technically, you don’t need any cyber security experience to get started, though many people entering the field will come from jobs that have similar skillsets, such as systems administration or information analysis. A version of this blog was originally published on 8 December 2017.

Tips 73

Brazil expert discovers Oracle flaw that allows massive DDoS attacks

Security Affairs

In this type of distributed denial of service (DDoS) attack, the malicious traffic generated with the technique is greater than the once associated with the use of memcached, a service that does not require authentication but has been exposed on the internet by inexperienced system administrators.

Wireshark fixed three flaws that can crash it via malicious packet trace files

Security Affairs

“To inject malformed packets that the Wireshark application may attempt to parse, the attacker may need access to the trusted, internal network where the targeted system resides. Administrators are advised to allow only trusted users to have network access.

Crooks continue to abuse exposed Docker APIs for Cryptojacking

Security Affairs

“We recently observed cases of abuse of the systems running misconfigured Docker Engine-Community with Docker application program interface (API) ports exposed. Cybercriminals continue to abuse unprotected Docker APIs to create new containers used for cryptojacking, Trend Micro warns.

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

The Last Watchdog

However, lacking robust protection, privileged accounts, which are intended to give administrators the access they need to manage critical systems, can instead be manipulated to enable attackers to move laterally across an organization’s network. The concept was based on the root access that the accounts provided to IT and systems administrators, who used these power accounts to maintain the network and systems.

Access 131

Experts discovered a severe command injection flaw in Cisco Webex Meetings Desktop

Security Affairs

An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.” ” Cisco advisory reveals that the vulnerability could be exploited remotely by leveraging the operating system remote management tools.

Only now we known that International Civil Aviation Organization (ICAO) was hacked in 2016

Security Affairs

“Mail server, domain administrator and system administrator accounts were all affected, giving cyberespions access to the past and current passwords of more than 2,000 ICAO system users.

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

Unfortunately, despite steady advances in malware detection and intrusion prevention systems, and much effort put into training employees to be wary of suspicious email, weaponized email and document-based malware remain as virulent as pervasive as it was two decades ago. It was designed to make it convenient for system administrators to automate tasks and manage configurations across all Windows endpoints and servers in a company network.

More Cloud Means More Multi-Tenant Environments

Thales eSecurity

To ensure a secure multi-tenant environment for consolidation, you need a solution that: adequately isolates security for specific tenants or customers; authorizes access to the data itself without allowing even systems administrators or privileged users to see the data; and.

Cloud 91

Initial patch for Webex Meetings flaw WebExec was incomplete. Cisco fixed it again

Security Affairs

An exploit could allow the attacker to run arbitrary commands with SYSTEM user privileges.” Cisco advisory reveals that the vulnerability could be also exploited remotely by leveraging the operating system remote management tools. when running on a Microsoft Windows end-user system.

User Conference Attendees Learn How to Maximize their DocuWare Experience

Document Imaging Report

The educational format provided system administrators and end users with training and best practices for applying DocuWare applications that empower their business to not just keep pace but to stay ahead. Integrating DocuWare with another system such as Outlook.

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Both were well-equipped to teach, test and train individuals ranging from teen-agers and non-technical adults, to working system administrators and even seasoned tech security pros. Another cluster of students attempted to crack into an Alphaville industrial controls system. “I We want to spread awareness of the core principles of exploiting systems – as well as defending them.”.

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Ransomware, business email compromises and direct ACH system hacks continue to morph and intensify. First, companies are more reliant on digital systems than ever before. So, for instance, we can walk through the benefits of sending, say a system administrator or help desk technician, through CompTIA CertMaster Learn , a self-paced eLearning platform that helps prepare them to earn the CompTIA Security+ certification.

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network.” It poses a threat to several different operating systems, including Windows, Linux, MAC OS X, and Android.” Security agencies belonging to Five Eyes (United States, United Kingdom, Canada, Australia and New Zealand) have released a joint report that details some popular hacking tools.

Tools 87

Three members of FIN7 (Carbanak) gang charged with stealing 15 million credit cards

Security Affairs

Hladyr is suspected to be a system administrator for the group. Three members of the cybercrime group tracked as FIN7 and Carbanak have been indicted and charged with 26 felony counts.

First Multistate HIPAA Data Breach Lawsuit May Signal Increased State Interest in Data Security Enforcement

Data Matters

million individuals from the Company’s systems. According to the complaint, over a period of 19 days, hackers were able to infiltrate the Company’s computer systems. They argue that the Company failed to protect its computer systems adequately, take steps to prevent the breach, disclose material facts to consumers, and provide timely and adequate notice, among other things.

Italy: Privacy law integrating the GDPR adopted, what to do?

DLA Piper Privacy Matters

The scope of the potentially applicable previous orders is quite broad as it goes from the role of the so called system administrator, to stringent security measures provided for specific data processing activities (e.g. The Italian budget law of 2017 had introduced a system of notification/authoritization for data processing activities performed by automated means and based on legitimate interest.


Stealing computing power: A growing trend in cyber crime that can target all Internet-connected devices


What is most alarming is that, in addition to advanced cyber attacks aimed at elaborate systems, criminals will use any device connected to the Internet – for example, your mobile phone or a remotely controlled heat pump. Is it just one device or a whole system?

GAO Report shed the lights on the failures behind the Equifax hack

Security Affairs

The reports also refers documents from the Internal Revenue Service (IRS), Social Security Administration (SSA), and U.S. “In July 2017, Equifax system administrators discovered that attackers had gained. A new report from the U.S.

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

Specifically, researchers believed that the current version of SB 315 could chill security research—both the purely academic and the “white hats”—ultimately discouraging individuals from identifying vulnerabilities in networks and alerting system administrators of the issues. Organizations have employed bug bounty programs in an effort to encourage researchers to report security flaws in their systems.

Trust, but Verify: Keeping Watch over Privileged Users

Thales eSecurity

Privileged users today can include a multitude of people from system administrators, network engineers, and database administrators, to data center operators, upper management, and security personnel.

Weekly podcast: Memcached DDoS attacks, Equifax (once again) and Alexa

IT Governance

An Akamai blog explained that memcached is “meant to cache data and reduce strain on heavier data stores […] and is only intended to be used on systems that are not exposed to the Internet”. According to Akamai, there are “currently more than 50,000 known vulnerable systems exposed”.

Finding the Optimal Alternative to the Google Search Appliance

Perficient Data & Analytics

The Nero Admin Portal provides system administrators and developers with an intuitive interface for configuration, monitoring, and reporting. Google decided to sunset the Google Search Appliance over the next several years, leaving a gap in the enterprise search space for organizations dependent on it for their public website search and secure internal search.

Cloud 40

How To Build A Cybersecurity Career | What Really Matters

Cyber Info Veritas

Since the general work of a cybersecurity specialist is to ensure that computer systems and networks are secure—essentially meaning cybersecurity experts are in charge of the electronic security of an organization—they must be knowledgeable.

Cyber Blackmail: More Than Just Ransomware

The Texas Record

The plethora of attacks has sent security professionals and system administrators scrambling to ensure their systems and backups are safe, and executives taking a second look at their cyber security programs.

Laying the foundation for cybersecurity


A system administrator did not apply a patch. The guidelines and standards developed at that time, which introduced the Confidentiality, Integrity and Availability model, still apply to any technology used to process and store information, whether it be a mobile device, a sensor, a process control system, etc. The basic tenets of securing systems and data still apply. Laying the foundation for cybersecurity. premanath.puch…. Mon, 05/21/2018 - 05:13.

FTC Posts Third Blog in Its “Stick with Security” Series

Hunton Privacy

Limit Administrative Access : While it is essential that a system administrator has the ability to change network settings in a business, this privilege should be limited to a select few people. By requiring different logins for employees and providing each user with the appropriate system privileges, companies can reduce the risk of having too many employees with administrative rights and avoid untrustworthy administrators.

DB2 for z/OS: Monitoring Prefetch Read Activity

Robert's Db2

My analysis of the figures suggested that the system administrators were concerned by numbers that were in fact positive in nature; however, I also saw prefetch items that really were troublesome, and I subsequently learned that these were likely due to a buffer pool configuration change that had been made to improve application performance but ended up working towards the opposite end.

Building the Relationship Between RM and IT

The Texas Record

Our programmers invite me to meetings involving any new system with a data retention consideration.

Using PowerShell for SharePoint 2010


In *nix, I prefer BASH (GNU Bourne-Again SHell) for administration. This is a major reason why *nix admins generally have managed a lot more systems than have Windows admins, requiring companies with Windows servers to hire more admins. This is handy to system administrators, but it is especially useful for someone like me, who is an architect with very little time to get their hands dirty. This shortcut should generally be "run as administrator.".

DB2 for z/OS Buffer Pool Enlargement is NOT Just an Elapsed Time Thing

Robert's Db2

A couple of weeks ago, I got a question from a mainframe DB2 DBA about the impact of DB2 buffer pool enlargement on application and system performance. I/O assist processors are great, and they are one reason that System z has long excelled as a platform for I/O-intensive applications, but general-purpose engines (and zIIP engines, for that matter) still have to shoulder some of the read/write load. That time period could capture a "peak" of system activity (e.g.,