Ten Immutable Laws Of Security

Interesting article on TechNet:

Law #1:

If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.

Law #2:

If a bad guy can alter the operating system on your computer, it’s not your computer anymore.

Law #3:

If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.

Law #4:

If you allow a bad guy to run active content in your website, it’s not your website any more.

Law #5:

Weak passwords trump strong security.

Law #6:

A computer is only as secure as the administrator is trustworthy.

Law #7:

Encrypted data is only as secure as its decryption key.

Law #8:

An out-of-date antimalware scanner is only marginally better than no scanner at all.

Law #9:

Absolute anonymity isn’t practically achievable, online or offline.

Law #10:

Technology is not a panacea.

http://technet.microsoft….y/hh278941.aspx

Exchange Activesync Statistics Update

Activesync Logo

It has been about a year since I last published some statistics on the different mobile devices that are connecting to the Exchange servers for email/calendaring. Those statistics can be found here.

There have been 5161 unique mobile devices that have accessed the Exchange service in the month from 09/05/11 to 08/06/11.

Stats May 11

As you can see there has been a huge increase in the number of mobile devices accessing the Exchange service and can surely be seen as an indication towards the reliance on mobile technology as a way of accessing University services.

A surprising statistic is that 4299 of the 5161 have used the service within the last 24 hours!