Everybody is jumping on the technology train (or should that be spaceship?) to find solutions to improving the way that everything is done in the modern world. We see it in homes, vehicles, and shops and so looking towards technology to solve your problems is something you cannot afford to avoid. There are new technologies […]
Tag Archives | IT security
It is impossible to ignore the recent cyberattacks on both public and private companies. From the WannaCry ransomware attack that wreaked havoc around the world, to the latest Equifax, SEC, and Deloitte cyberattacks, it seems as if these events are becoming more commonplace. Cyberattacks are extremely costly to any organization. From the cost of the […]
Bring Your Own Devices (BYOD) is part of a larger set of acronyms disrupting the IT chain of command. Akin to BYOT (Bring Your Own Technology) and BYOP (Bring Your Own Phone), BYOD encompasses any policy allowing employees to use personal gadgets to access corporate data. No longer a fad, ZDNET reports nearly three-quarters of […]
There has been much hand wringing, teeth gnashing and, yes, frantic typing over the Mirai botnet. With what it’s managed to pull off in its relatively short life-span, rightfully so. Much of what has been said about this new breed of record-busting botnet has focused on what it’s done, however, rattling off the attacks on […]
The Internet can lay bare thousands of unsecured printer hard drives lying exposed in various organizations. According to researchers, lack of security hygiene on the part of numerous organizations is currently being exploited by cyber terrorists and hackers to host malevolent code and dodge their tracks with the help of a new and secret techniques […]
Every business has an IT system that it runs. This is probably the case for yours right now. But how secure and how reliable is that IT system in your office? If you’re not really sure how to answer that, the chances are it could be a lot more secure and reliable than it currently […]
The most important part of running a successful business is protecting your data and information. As your company grows, so does the threat of others breaching your security. If your information is compromised, then you are putting your business at risk of failure.
In the interconnected world we live in today, it’s easy for hackers and identity thieves to access your business’ valuable data. In fact, cyber attacks rank first among the threats in doing business in the United States, according to the World Economic Forum 2016 Global Risks Report. Avoid compromising the safety of your company’s information […]
Internet trolls use their “LULZ” to track how well and often they are able to disrupt other parties’ equilibria. A troll might knowingly post a comment or image that other people find offensive, but that troll will use the tagline “I did it for the Lulz” to off-handedly justify his posting. (For the uninitiated, “Lulz” […]
What are some word associations you have with the term hacker? Words like crook, cybercriminal, Fancy Bear, Anonymous, activist or hacktivist might jump to mind pretty quickly. Doesn’t it seem peculiar that the words cybercriminal and activist are associated with hacker? The goal of a cybercriminal is to blackmail and extort money. The goal of […]
Regardless of the type of business you’re running, you likely have some information that you need to keep secure. And because email is generally the fastest and easiest way for you to conduct your business communications, ensuring that any and all sensitive information that you send via email is safe from prying eyes must be […]
Ever considered owning a server? There are many benefits of owning one, but it’s not without its falls. If you are serious about buying one for yourself or your company, then you are certainly willing and able to part with the huge amount of money these things go for.
If your company is fairly large, then you probably have a lot of assets which need managing and protection. From your office building to the equipment you use to keep your business running, there are all kinds of physical assets which need taking care of. In 2016 though, the issue will extend far past these […]
Ransom is an ugly word. It conjures up images of violent kidnappings, dark basement rooms, and cut-and-pasted letters demanding financial compensation. Most Americans are fortunate enough not to come face-to-face with real-life kidnappers in their daily lives, but kidnapping is a sad fact of life in many parts of the world. Goodness knows how many […]
One of the reasons that the Apple operating system was perceived to be so safe throughout the late nineties and early 2000s is that the user base was relatively low. The use was also limited to professional settings, so there wasn’t likely to be much more than a work email address from a Mac user.
New technology initiatives such as cloud computing, mobility and BYOD are designed to reduce cost of business however the security sector sees a widening gap between the ever growing complexity of connected devices and the ability of the security team to secure the environment and quickly detect and resolve incidents within the business.