Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for Business Security

Mar
01

Morto Windows Worm Spread by Attacking Weak Passwords

Posted by: | Comments Comments Off on Morto Windows Worm Spread by Attacking Weak Passwords

Unsafe Password Management Practices

Morto article by Dovell Bonnet of Access-Smart.comThe result of poor password management and insecure systems is all too evident in the press lately with thousands of password breaches for Sony Playstation Network, Gawker media’s sites, RockYou.com and many others.

The new password -guessing Windows worm “Morto” is spread by attacking weak passwords. “Morto” takes advantage of the fact that so many computers, servers and networks secure the front door with a simple hook ‘n’ latch security system. By that, I mean the weakness in complexity and management of password logons. It is not that passwords are insecure, but rather how users pick and manage their passwords. Morto works by attempting to log in to accounts using a series of incredibly weak passwords, such as “12345,” “admin,” “password,” and “test,” along with some brute-force dictionary guesses. It also attempts overly common logon names, including “administrator,” “admin,” “backup,” and “sql.” Read More→

Comments Comments Off on Morto Windows Worm Spread by Attacking Weak Passwords
Feb
28

Preventing Data Loss With Password Manager Tools

Posted by: | Comments Comments Off on Preventing Data Loss With Password Manager Tools

Power LogOn’sIt is impossible to understate the importance of having and using strong, secure online passwords, both personally and for companies. As tools like here have shown, gaining access to an email or Facebook account can be alarmingly simple.

One of the primary reasons individuals reuse the same passwords is because keeping track of 100 different logins is difficult, if not impossible. This is where password management applications become crucial, especially in a business environment. For business accounts, using a separate, unique password for each major service — and making sure that none of these passwords are the same as those associated with personal accounts should be mandatory in a business environment. Read More→

Comments Comments Off on Preventing Data Loss With Password Manager Tools
Feb
23

Shady RAT World Wide Hacking

Posted by: | Comments Comments Off on Shady RAT World Wide Hacking

Operation Shady Rat by Dovell Bonnet, Access-Smart.comRecently McAffe published a worldwide hacking report about what they are calling Shady RAT.

The United Nations, Olympic committees, governments, U.S. real estate company, a major media organization based in New York, a satellite communications company and other companies around the world, totaling 72 organizations, have been hacked by a “state actor”.

While there are suspicions as to which country was involved,it has not yet been proven. McAfee’s vice-president of threat research, Dmitri Alperovitch, wrote in a 14-page report that, “Even we were surprised by the enormous diversity of the victim organizations and were taken aback by the audacity of the perpetrators. What is happening to all this data … is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team’s playbook), the loss represents a massive economic threat.” Read More→

Comments Comments Off on Shady RAT World Wide Hacking
Feb
20

Are You At Risk For Online Identity Theft?

Posted by: | Comments Comments Off on Are You At Risk For Online Identity Theft?

Are you at risk for online identity thef? by Dovell BonnetPeople use the internet mainly for three things – searching, sharing, and shopping. The advent of smartphones and social media these last few years has opened up a new activity: texting. This new world is where communication is happening is opening up new security. In many cases people are using social networking as an online diary where they share their deepest thoughts and opinions, their travel plans and personal information. Read More→

Comments Comments Off on Are You At Risk For Online Identity Theft?
Feb
02

Medical ID Theft Is Nothing To Sneeze At

Posted by: | Comments Comments Off on Medical ID Theft Is Nothing To Sneeze At

Below is a report from the Smart Card Alliance on Medical Identity Theft. While the info is staggering the walk away points for me is the migration to PHRs, EHRs and HIEs. Security has to start at the very beginning and that is where a secure token and password manager combination work well together. Read More→

Comments Comments Off on Medical ID Theft Is Nothing To Sneeze At
FLEXCAP
SiteLock