Welcome!

The Sky is No Longer the Limit: Thoughts from the Cloud

Kevin Nikkhoo

Subscribe to Kevin Nikkhoo: eMailAlertsEmail Alerts
Get Kevin Nikkhoo via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Kevin Nikkhoo

Does this sound familiar? Ann, sitting at her desk eating lunch, is surfing the Net. She checks her personal Yahoo email account and sees a message from a purported survey company asking her about her music preferences. She opens the email and takes the survey. Seems harmless enough, but what Ann doesn’t know is that this survey company doesn’t exist and embedded in some of the survey prompts hides an undetected botnet that downloaded onto her desktop. This nasty bugger can record her keystrokes and take screen shots as she navigates through your network. Now some unauthorized entity has her login credentials, passwords…essentially her online/employee  identity and access to your enterprise’s proprietary assets and other sensitive data. You tell them, you educate them, but sometimes it’s not enough. You need to implement another layer of security. These threats aren’... (more)

MSPs Must Practice What They Preach – Especially with Security

A man walks into the doctor’s office. He hasn’t been feeling well. A virus has been floating around the office and the man feels he’s caught it. Doctor walks in, smiles and picks up the chart. He starts examining the man and as he writes a prescription advises he keeps sanitary and wash his hands several times a day. Do you trust this doctor.especially after he prescribes vigorous hand-washing, but forgot to wash his own before poking and prodding during the exam. Obviously this doctor loses credibility. This moral is a lesson that MSPs (managed service providers) must heed. MSP... (more)

Can Your Company Afford to Lose $400 Million?

Of course not. But that’s the dollar figure companies stand to lose in terms of consumer trust when security protocols are breached according to a recent study by the research firm Ponemon. In terms of dollars and cents on a risk analysis spreadsheet, it is easier to put a value on a particular asset than the potential recurring value of a client, customer or even partner. Beyond lawsuits and capital and operational expenses to repair a mea culpa, weak cryptography, hack defenses or shoring an previously-undiagnosed vulnerability gap, the damage done to a brand because the user ... (more)

The Challenge of Herding Cats: Your SaaS Portfolio and Security

It’s obvious the rise of SaaS (software-as-a-service) has changed the game. The benefits of subscribing to a cloud-based application service are already well-known and documented: cost-efficiencies, speed, hands-off maintenance, etc… It’s no longer an emerging practice and, for most IT managers, has become an inextricable component of any go-forward IT network strategy. What this means is now there are dozens of new sign-ons per user from a variety of endpoints (including mobile and tablet). And if we are talking enterprise-wide deployments, this is can be as challenging as herdi... (more)

Lessons Learned from LinkedIn

Users are making it too easy for hackers. If we take a closer look at the 6.5 million hashed LinkedIn passwords that leaked we find a large swath of the user population are ignoring warnings of overly simplistic and obvious passwords. Would you believe the most common word or phrase found in a 160K sampling of the list was “link”? And would you further shake your head in disbelief that “1234” and “12345” followed close behind. Rounding out the top 10 were “work,” “god,” “job,” “angel,” “the,” “ilove,” and “sex.” More so than Facebook, LinkedIn is the social media of choice for bu... (more)