by Marketing | Oct 14, 2015 | Security
The primary operations of nearly all businesses rely on secure data storage and access. That is why it is essential to take the appropriate measures to protect your company data. If you do not, your company’s valuable data—an extremely important asset—could be at...
by admin | Sep 26, 2014 | Security
With the latest September 24th revelation of the bash bug coined “Shellshock” the question becomes: Have we turned a corner and open source software now becomes more expensive to maintain than proprietary products like Microsoft? The last two headline-inducing...
by admin | Sep 25, 2014 | Security
Is the bash bug, shellshock, worse than the heartbleed bug? There is some debate on the topic, however it is likely that the bash bug will be worse because the attack surface is so large and the exploit can lead to an infinite amount of secondary attacks. Additional...
by admin | Sep 15, 2014 | Security
As emerging and state-sponsored threats continue to escalate, security professionals report lower confidence in their ability, or specifically in their organization’s ability to properly detect and respond to threats. This article from Dark Reading by Ericka...
by admin | Aug 19, 2014 | Security
Many years ago when Internet fraud was in its infancy, I had a credit card number stolen online. This was in the mid 1990’s. It was used for numerous charges world-wide until I noticed it. While I hadn’t noticed the first few sub $100 charges, I did notice them when...
by admin | Aug 5, 2014 | Security
Writing security policy is a complicated task that should involve input from players from upper management, human resources, staff representatives, IT, physical security, legal, and marketing / public relations. In small businesses one person may take on multiple...