If you own or run an e-commerce site, take a few extra minutes before declaring that yes, of course your website is prepared for this holiday seasons’ influx of online shopping. During this time of the year, people all over the world are shopping for gifts for their loved ones. Due to the nature of […]
You wouldn’t just hand over your books to anybody on Craigslist who claims to have ‘experience with accounting’ would you? Of course not! Why, then, would you trust a security, networking or communications company simply because they have a website? The answer, of course, is that you wouldn’t. You would make sure that any company […]
One of the reasons that the Apple operating system was perceived to be so safe throughout the late nineties and early 2000s is that the user base was relatively low. The use was also limited to professional settings, so there wasn’t likely to be much more than a work email address from a Mac user.
New technology initiatives such as cloud computing, mobility and BYOD are designed to reduce cost of business however the security sector sees a widening gap between the ever growing complexity of connected devices and the ability of the security team to secure the environment and quickly detect and resolve incidents within the business.
Many businesses spend 80% of their security budget on security controls that provide defences to protect the business from threats. The remaining 20% is spent on intrusion detection and mitigation strategies.
When you are running a website there are all kinds of different dangers a designer can run into. When you are running a website where you are attempting to sell your photographs there are rather distinct factors you are going to need to have to worry about. Hackers and malware are things that everyone on […]
No doubt you have read numerous articles warning you to have strong passwords and a different password for every account. For most people this advice is unrealistic since most of us have at least 20+ accounts all requiring a username and password – everything from online banking, social media profiles, online stores to paying for […]
The NZ Govt has released a new website for the NZ general public to help educate all on the importance of cyber security. A section for the SME sector will also be released soon which will provide templates for security policies and other tools.
Thieving employees can destroy a business that took years of blood-sweat-tears to create. Not only do the owners suffer but all the honest-harding staff possibly losing their jobs. This post provides some tips for helping to reduce employee theft.
More than ever its vital for every business to employ effective security policies and checklists for making sure systems are in order. Below are some checklist tips that should be of benefit to you focusing on Retail. I have created overall security checklists but for this post I have just provided additional retail focused ones.
In 2014 you will see a dramatic increase in media reporting IT security related breeches and more businesses data being held to ransom with variants of the Ransomware malware.
What is very bad is that the encryption process cannot be undone by running a simple virus scan. Encryption is the process of making data unreadable by using extremely complex mathematical algorithms. To unlock the encrypted data you need a “key” and in regards to ransomware the hacker holds that key.
Its not hard to guess what the child will be doing on the device – an almost 100% guarantee that they will be on the Internet checking out their social media profiles, watching videos and playing games. This is ideal for hackers because there is a good chance that ultimately the child will end up […]
An unbelievable post on Naked Security today titled “Nude Carla Bruni pics masking Trojan lured G20 attendees to click” – it appears that even well-educated and powerful people fall for the most stupid of phishing tricks.
All it takes is for one staff member to infect their own device with malware or a virus at home or on public wifi and plug it into the business network. For small businesses who do not even have an IT department BYOD will be a major cause of unwanted intrusion in 2014.
Providing a wireless network for your staff may offer convenience to move about the office freely and avoid the spaghetti-effect of intertwined network cables but wireless comes with its own vulnerabilities that can expose your business to threats.