Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.
Oct
22

Social Networking Hack Increases Data Breach Vulnerability

By · Comments Comments Off on Social Networking Hack Increases Data Breach Vulnerability

Data breach can affect other “SoNet” Junkies

Network access authenticationThe hack of the social networking (“SoNet”) giant LinkedIn may have made your company more vulnerable to a data breach. The recent attack where 6.5 million passwords were posted on a Russian online forum has been well reported. The combination of insecure data files, outdated cryptography and user-managed passwords should make every corporate officer to demand a network security audit. So what happened?

There were a number of security failures:

  • The inability to first authenticate who’s “knocking” on the firewall before allowing them access
  • The use of outdated, weak encryption to secure the password data files, and
  • Users having the ability to implement weak passwords. Read More→
Comments Comments Off on Social Networking Hack Increases Data Breach Vulnerability
Oct
20

Data Breach Costs Drop Misleads while Cyberattacks Increase

By · Comments Comments Off on Data Breach Costs Drop Misleads while Cyberattacks Increase

A Data Breach can still bankrupt a business

Network Access AuthenticationIn Ponemon Institution’s annual “Symantec” shows that the cost per record lost and the average cost of a data breach dropped in 2011. The cost per record dropped from $214 to $194, and from an average breach cost from $7.2M to $5.5M. The decline is credited to organizations being better prepared for and responding to a data breach. Here are some of the reasons for the drop:

  • The decrease in per capita breach costs
  • The average size of a data breach
  • The decrease in abnormal customer churn
  • A drop in the average total cost of a data breach response

While this may seem great news, don’t let your guard down just yet. All this is showing is that the costs to a company are dropping, and having a plan and response team will lower a company’s costs. From another industry report, Symantec claims that the number of attacks increased 81% from 2010 to 2011. Read More→

Comments Comments Off on Data Breach Costs Drop Misleads while Cyberattacks Increase
Oct
18

Electronics Travel Dangers

By · Comments Comments Off on Electronics Travel Dangers

Dangers of Traveling Overseas with Mobile Phones, Laptops, PDA’s and other Electronic Devices

Re-posting from “The Talon Shield”Data Security, June 2012, Issue #6

Hotel business centers and phone networks are regularly monitored in many countries. In some countries hotel rooms are often searched. All information you send electronically-by fax machine, personal digital assistant (PDA), computer, or telephone can be intercepted. Wireless devices are particularly vulnerable.
Security services and criminals can track your movements using your mobile phone or PDA and can turn on the microphone in your device even when you think it’s off. To prevent this, remove the battery. Security services or criminals can also insert malicious software into your device through any connection they control. They can also track you or listen to your conversations if your device is enabled for wireless. When you connect to your home server, the malware can migrate to your business or home system, can inventory your system and be received by the Security service or criminals. Read More→

Comments Comments Off on Electronics Travel Dangers
May
01

Google may be doing Harm

By · Comments Comments Off on Google may be doing Harm

Google is gathering your personal and corporate data.

Cloud security Google Inc. (GOOG) supposively has the motto, “do no harm.” But who defines what is harmfull? Employees recently testified to the U.S. Federal Communications Commission that they didn’t initially know that their mapping-service project software was gather personal data, even though an undisclosed engineer told a few fellow workers. The software would access payload data like e-mails, text messages, passwords, internet-usage, and other highly sensitive personal information. The FCC ended up not penalizing Google for data gathering, but assessed a $25,000 fine for not cooperating with the FCC during the initial inquiry. The fine would not even be considered a slap on the wrist. Read More→

Comments Comments Off on Google may be doing Harm
Mar
08

Rumors of Password Death Are Greatly Exaggerated

By · Comments Comments Off on Rumors of Password Death Are Greatly Exaggerated

Rumors of Password Death Are Greatly Exaggerated by Dovell Bonnett of Access Smart.comMcAfee recently revealed that 72 different organizations around the world have been victims of cyber-spying. With attacks likely to increase, it is important to note that strengthening your access controls ensures that you have a higher level of security for all those who are attempting to access the network.

However, PKI is not the panacea that some hope it would be, and the death of passwords is greatly exaggerated. From a security perspective PKI is without a doubt the best, but when it comes to high cost of ownership, time consuming implementations and specialized support staff here as well PKI wins.

Passwords are free and very easy to control, but the weakness is not in passwords but rather how people choose them, manage them and types them. Almost every breach that involved passwords was not because of passwords but because of the password used by the individual. It is no wonder that accounts and companies are getting hacked through passwords especially when IT keeps making password security more burdensome on the user. Employees are being forced to write them down, come up with easy ones to remember and use the same ones everywhere. If security is cumbersome, employees will always circumvent it for their own convenience. That is a fact. Read More→

Comments Comments Off on Rumors of Password Death Are Greatly Exaggerated
FLEXCAP
SiteLock