Tag Archives | IT security

AI Technology

How Tech Can Save Your Business

Everybody is jumping on the technology train (or should that be spaceship?) to find solutions to improving the way that everything is done in the modern world. We see it in homes, vehicles, and shops and so looking towards technology to solve your problems is something you cannot afford to avoid. There are new technologies […]

Continue Reading
0 Comments
data analysis

Legacy Modernization in the Age of Cyberattacks

It is impossible to ignore the recent cyberattacks on both public and private companies. From the WannaCry ransomware attack that wreaked havoc around the world, to the latest Equifax, SEC, and Deloitte cyberattacks, it seems as if these events are becoming more commonplace. Cyberattacks are extremely costly to any organization. From the cost of the […]

Continue Reading
0 Comments
office

Keep On Top Of Your BYOD Policies

Bring Your Own Devices (BYOD) is part of a larger set of acronyms disrupting the IT chain of command. Akin to BYOT (Bring Your Own Technology) and BYOP (Bring Your Own Phone), BYOD encompasses any policy allowing employees to use personal gadgets to access corporate data. No longer a fad, ZDNET reports nearly three-quarters of […]

Continue Reading
0 Comments
Cyber

Big and bad: how the Mirai botnet pulls off its massive DDoS attacks

There has been much hand wringing, teeth gnashing and, yes, frantic typing over the Mirai botnet. With what it’s managed to pull off in its relatively short life-span, rightfully so. Much of what has been said about this new breed of record-busting botnet has focused on what it’s done, however, rattling off the attacks on […]

Continue Reading
0 Comments
cyber security

Vulnerable Printers a Gold Rush for Cyber-Terrorists

The Internet can lay bare thousands of unsecured printer hard drives lying exposed in various organizations. According to researchers, lack of security hygiene on the part of numerous organizations is currently being exploited by cyber terrorists and hackers to host malevolent code and dodge their tracks with the help of a new and secret techniques […]

Continue Reading
0 Comments
Security

5 Ways to Protect Your Business from Cyber Criminals

In the interconnected world we live in today, it’s easy for hackers and identity thieves to access your business’ valuable data. In fact, cyber attacks rank first among the threats in doing business in the United States, according to the World Economic Forum 2016 Global Risks Report. Avoid compromising the safety of your company’s information […]

Continue Reading
0 Comments
security

For the Lulz: Why Cybersecurity is No Laughing Matter

Internet trolls use their “LULZ” to track how well and often they are able to disrupt other parties’ equilibria. A troll might knowingly post a comment or image that other people find offensive, but that troll will use the tagline “I did it for the Lulz” to off-handedly justify his posting. (For the uninitiated, “Lulz” […]

Continue Reading
0 Comments
hats

Understanding Black Hat, White Hat and Gray Hat Hackers

What are some word associations you have with the term hacker? Words like crook, cybercriminal, Fancy Bear, Anonymous, activist or hacktivist might jump to mind pretty quickly. Doesn’t it seem peculiar that the words cybercriminal and activist are associated with hacker? The goal of a cybercriminal is to blackmail and extort money. The goal of […]

Continue Reading
0 Comments
emails

3 Tips for Keeping Your Business Emails More Secure

Regardless of the type of business you’re running, you likely have some information that you need to keep secure. And because email is generally the fastest and easiest way for you to conduct your business communications, ensuring that any and all sensitive information that you send via email is safe from prying eyes must be […]

Continue Reading
0 Comments
digital

What Is Digital Asset Management?

If your company is fairly large, then you probably have a lot of assets which need managing and protection. From your office building to the equipment you use to keep your business running, there are all kinds of physical assets which need taking care of. In 2016 though, the issue will extend far past these […]

Continue Reading
0 Comments
ransom

Don’t Pay! 6 Ways to Protect Yourself from Ransomware

Ransom is an ugly word. It conjures up images of violent kidnappings, dark basement rooms, and cut-and-pasted letters demanding financial compensation. Most Americans are fortunate enough not to come face-to-face with real-life kidnappers in their daily lives, but kidnapping is a sad fact of life in many parts of the world. Goodness knows how many […]

Continue Reading
0 Comments
securitywork

The Cost of Leaving Security Behind

One of the reasons that the Apple operating system was perceived to be so safe throughout the late nineties and early 2000s is that the user base was relatively low. The use was also limited to professional settings, so there wasn’t likely to be much more than a work email address from a Mac user.

Continue Reading
0 Comments
security

IT Security – State of Play Update for October 2014

New technology initiatives such as cloud computing, mobility and BYOD are designed to reduce cost of business however the security sector sees a widening gap between the ever growing complexity of connected devices and the ability of the security team to secure the environment and quickly detect and resolve incidents within the business.

Continue Reading
0 Comments