Does this sound familiar? Ann, sitting at her desk eating lunch, is surfing
the Net. She checks her personal Yahoo email account and sees a message from
a purported survey company asking her about her music preferences. She opens
the email and takes the survey. Seems harmless enough, but what Ann doesn’t
know is that this survey company doesn’t exist and embedded in some of the
survey prompts hides an undetected botnet that downloaded onto her desktop.
This nasty bugger can record her keystrokes and take screen shots as she
navigates through your network. Now some unauthorized entity has her login
credentials, passwords…essentially her online/employee identity and
access to your enterprise’s proprietary assets and other sensitive data.
You tell them, you educate them, but sometimes it’s not enough. You need to
implement another layer of security. These threats aren’... (more)
A man walks into the doctor’s office. He hasn’t been feeling well. A
virus has been floating around the office and the man feels he’s caught it.
Doctor walks in, smiles and picks up the chart. He starts examining the man
and as he writes a prescription advises he keeps sanitary and wash his hands
several times a day.
Do you trust this doctor.especially after he prescribes vigorous
hand-washing, but forgot to wash his own before poking and prodding during
Obviously this doctor loses credibility. This moral is a lesson that MSPs
(managed service providers) must heed. MSP... (more)
Of course not. But that’s the dollar figure companies stand to lose in
terms of consumer trust when security protocols are breached according to a
recent study by the research firm Ponemon.
In terms of dollars and cents on a risk analysis spreadsheet, it is easier to
put a value on a particular asset than the potential recurring value of a
client, customer or even partner. Beyond lawsuits and capital and operational
expenses to repair a mea culpa, weak cryptography, hack defenses or shoring
an previously-undiagnosed vulnerability gap, the damage done to a brand
because the user ... (more)
It’s obvious the rise of SaaS (software-as-a-service) has changed the game.
The benefits of subscribing to a cloud-based application service are already
well-known and documented: cost-efficiencies, speed, hands-off maintenance,
etc… It’s no longer an emerging practice and, for most IT managers, has
become an inextricable component of any go-forward IT network strategy. What
this means is now there are dozens of new sign-ons per user from a variety of
endpoints (including mobile and tablet). And if we are talking
enterprise-wide deployments, this is can be as challenging as herdi... (more)
Users are making it too easy for hackers.
If we take a closer look at the 6.5 million hashed LinkedIn passwords that
leaked we find a large swath of the user population are ignoring warnings of
overly simplistic and obvious passwords. Would you believe the most common
word or phrase found in a 160K sampling of the list was “link”? And would
you further shake your head in disbelief that “1234” and “12345”
followed close behind. Rounding out the top 10 were “work,” “god,”
“job,” “angel,” “the,” “ilove,” and “sex.”
More so than Facebook, LinkedIn is the social media of choice for bu... (more)