5 Essential Data Security Measures for Businesses

The primary operations of nearly all businesses rely on secure data storage and access. That is why it is essential to take the appropriate measures to protect your company data. If you do not, your company’s valuable data—an extremely important asset—could be at...

Shellshock: The Cost of Open Source Software

With the latest September 24th revelation of the bash bug coined “Shellshock” the question becomes: Have we turned a corner and open source software now becomes more expensive to maintain than proprietary products like Microsoft? The last two headline-inducing...

Bash Bug Worse Than Heartbleed?

Is the bash bug, shellshock, worse than the heartbleed bug? There is some debate on the topic, however it is likely that the bash bug will be worse because the attack surface is so large and the exploit can lead to an infinite amount of secondary attacks. Additional...

Breach of Patient Identification Information

Many years ago when Internet fraud was in its infancy, I had a credit card number stolen online. This was in the mid 1990’s. It was used for numerous charges world-wide until I noticed it. While I hadn’t noticed the first few sub $100 charges, I did notice them when...

Is Written Company Policy up to Par?

Writing security policy is a complicated task that should involve input from players from upper management, human resources, staff representatives, IT, physical security, legal, and marketing / public relations. In small businesses one person may take on multiple...