by admin | Sep 26, 2014 | Security
With the latest September 24th revelation of the bash bug coined “Shellshock” the question becomes: Have we turned a corner and open source software now becomes more expensive to maintain than proprietary products like Microsoft? The last two headline-inducing...
by admin | Sep 25, 2014 | Security
Is the bash bug, shellshock, worse than the heartbleed bug? There is some debate on the topic, however it is likely that the bash bug will be worse because the attack surface is so large and the exploit can lead to an infinite amount of secondary attacks. Additional...
by admin | Sep 15, 2014 | Security
As emerging and state-sponsored threats continue to escalate, security professionals report lower confidence in their ability, or specifically in their organization’s ability to properly detect and respond to threats. This article from Dark Reading by Ericka...
by admin | Aug 19, 2014 | Security
Many years ago when Internet fraud was in its infancy, I had a credit card number stolen online. This was in the mid 1990’s. It was used for numerous charges world-wide until I noticed it. While I hadn’t noticed the first few sub $100 charges, I did notice them when...
by admin | Aug 5, 2014 | Security
Writing security policy is a complicated task that should involve input from players from upper management, human resources, staff representatives, IT, physical security, legal, and marketing / public relations. In small businesses one person may take on multiple...
by admin | Aug 1, 2014 | Security
Businesses find themselves in many different stages of development when it comes to information technology and security. Smaller businesses may not have anyone on staff dedicated to IT or security. Those functions that go beyond basic computer knowledge that the...