IT Gets a Summer Vacation with Light Patch Load for June

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next IT Gets a Summer Vacation with Light Patch Load for June-9 Next

Another important feature that is of particular interest to Henry as a forensic professional is the encryption feature using the TCM chip in Windows. This encryption is enabled by default. This is great for users, but for forensics and incident response folks charged with removing data from devices on behalf of law enforcement, this could make their jobs a little more difficult. It’s similar to the default encryption on the iPhone 5. However, there’s a three- to seven-month delay from Apple for law enforcement requests for decryption. In cases such as a missing child, where time is of the essence, this is particularly troubling. With Microsoft also adding this capability, the days of “knock and look,” where law enforcement can gain immediate access to data to solve crimes, may be over. It is Henry’s hope that Microsoft is able to avoid that same issue, perhaps by providing a decryption key to law enforcement.

It’s a record month for Microsoft this month, according to Paul Henry, security and forensic analyst at Lumension. With just five bulletins, June marks the lowest number of bulletins we’ve seen from Microsoft to date this year, making it a light month for IT admins. It’s also the halfway point for the year, which is always a good time to look back at last year and compare. With 50 total bulletins for the year, Microsoft has issued a total of eight more bulletins this year than at the same time last year. Interestingly, the company has issued exactly the same number of critical bulletins so far this year at 16. That means the balance is made up of important bulletins, which are the type of bulletins we prefer to see.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.