Its not hard to guess what the child will be doing on the device – an almost 100% guarantee that they will be on the Internet checking out their social media profiles, watching videos and playing games. This is ideal for hackers because there is a good chance that ultimately the child will end up […]
An unbelievable post on Naked Security today titled “Nude Carla Bruni pics masking Trojan lured G20 attendees to click” – it appears that even well-educated and powerful people fall for the most stupid of phishing tricks.
All it takes is for one staff member to infect their own device with malware or a virus at home or on public wifi and plug it into the business network. For small businesses who do not even have an IT department BYOD will be a major cause of unwanted intrusion in 2014.
Providing a wireless network for your staff may offer convenience to move about the office freely and avoid the spaghetti-effect of intertwined network cables but wireless comes with its own vulnerabilities that can expose your business to threats.
What is wrong with some businesses? This is incredibly basic security!! First off if you don’t understand encryption get some one in who can explain – and before that – don’t carry bloody sensitive data around on a USB stick!!
If you have children and a family computer you might have already had to clean out junk software that the children have downloaded and even somehow got the computer infected with multiple forms off malware and other nasties. Now imagine taking that same computer to your work and plugging it into your business network.
An article written this year reported that over 30% of people do not password protect their mobile devices yet some apps installed on these devices have direct access to some of your most important accounts such as online banking!
Here is an example for New Zealand on how I could gather your online banking details when you use a public wifi
Most hackers know that people will use the same password for many accounts and sometimes using the same password “structure” but changing a few characters to come out with a password that is different but still roughly the same.
Now you wouldn’t leave the front door of your business premises unlocked when no one is there would you? Its kinda natural that you lock the door and turn on the alarm when you leave the office right?
Regardless of firewalls, anti-virus and spam-filtering software protecting your business assets they can all be compromised by staff not trained in basic security practices.
If staff are not trained to follow a process when dealing with any facet of security including IT systems then no amount of firewall rules, application security or padlocks is going to save your business.
I was inspired to write this eBook after reading about a small business owner’s desperate attempts to get his website back. It had been highjacked by a disgruntled contractor.
CMS email bulk delivery engines are at best poorly designed to handle bulk emailing. I won’t bore you with domain throttling, instant unsubscribe header, SPF, DKIM and the other techie stuff needed to get your emails delivered. But what I do want you to think about is what happens when a hacker breaks into your […]
We all know the importance of making sure the third party systems you share your business data with provides the maximum security for your data within their environment – but how can you tell?
Mobilize Mail is pleased to announce added security features for their API service which allows third party applications such as CRM systems to share data with their email marketing account.