No doubt you have read numerous articles warning you to have strong passwords and a different password for every account. For most people this advice is unrealistic since most of us have at least 20+ accounts all requiring a username and password – everything from online banking, social media profiles, online stores to paying for […]
The NZ Govt has released a new website for the NZ general public to help educate all on the importance of cyber security. A section for the SME sector will also be released soon which will provide templates for security policies and other tools.
Thieving employees can destroy a business that took years of blood-sweat-tears to create. Not only do the owners suffer but all the honest-harding staff possibly losing their jobs. This post provides some tips for helping to reduce employee theft.
More than ever its vital for every business to employ effective security policies and checklists for making sure systems are in order. Below are some checklist tips that should be of benefit to you focusing on Retail. I have created overall security checklists but for this post I have just provided additional retail focused ones.
In 2014 you will see a dramatic increase in media reporting IT security related breeches and more businesses data being held to ransom with variants of the Ransomware malware.
What is very bad is that the encryption process cannot be undone by running a simple virus scan. Encryption is the process of making data unreadable by using extremely complex mathematical algorithms. To unlock the encrypted data you need a “key” and in regards to ransomware the hacker holds that key.
Its not hard to guess what the child will be doing on the device – an almost 100% guarantee that they will be on the Internet checking out their social media profiles, watching videos and playing games. This is ideal for hackers because there is a good chance that ultimately the child will end up […]
An unbelievable post on Naked Security today titled “Nude Carla Bruni pics masking Trojan lured G20 attendees to click” – it appears that even well-educated and powerful people fall for the most stupid of phishing tricks.
All it takes is for one staff member to infect their own device with malware or a virus at home or on public wifi and plug it into the business network. For small businesses who do not even have an IT department BYOD will be a major cause of unwanted intrusion in 2014.
Providing a wireless network for your staff may offer convenience to move about the office freely and avoid the spaghetti-effect of intertwined network cables but wireless comes with its own vulnerabilities that can expose your business to threats.
What is wrong with some businesses? This is incredibly basic security!! First off if you don’t understand encryption get some one in who can explain – and before that – don’t carry bloody sensitive data around on a USB stick!!
If you have children and a family computer you might have already had to clean out junk software that the children have downloaded and even somehow got the computer infected with multiple forms off malware and other nasties. Now imagine taking that same computer to your work and plugging it into your business network.
An article written this year reported that over 30% of people do not password protect their mobile devices yet some apps installed on these devices have direct access to some of your most important accounts such as online banking!
Here is an example for New Zealand on how I could gather your online banking details when you use a public wifi
Most hackers know that people will use the same password for many accounts and sometimes using the same password “structure” but changing a few characters to come out with a password that is different but still roughly the same.
Now you wouldn’t leave the front door of your business premises unlocked when no one is there would you? Its kinda natural that you lock the door and turn on the alarm when you leave the office right?