Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for January, 2012

Jan
31

Is Email Marketing a Thing of the Past?

Posted by: | Comments Comments Off on Is Email Marketing a Thing of the Past?

Is email marketing a waste of time and money by Dovell BonnetEmail flyers and advertisements largely replaced paper flyers, just as online news blogs and sites are largely replacing traditional newspapers. However, email marketing is becoming less effective each passing day because people are so bombarded with spam in their email boxes that they simply are not responding as readily to blandishments to signup for free newsletters or to click on links in emails from people or companies that they have never heard of, no matter how enticing the offer.

Internet security or the lack there of, has made users suspicious and distrustful to all unsolicited emails. Let’s first take the argument from the personal perspective. We all have been hit with spam in our email accounts. We may have also experiences are own email address being hijacked by email spoofers. All with the intent to get the recipient to click a link or open a file to start the process of identity theft. Read More→

Comments Comments Off on Is Email Marketing a Thing of the Past?
Jan
26

Passwords are More Secure than Biometrics for Network Security

Posted by: | Comments Comments Off on Passwords are More Secure than Biometrics for Network Security

A Hewlett-Packard’s white paper “HP ProtectTools: Authentication technologies and suitability to task“, 06/2005, does a very good job discussing the different security technologies available (Passwords, Trusted Platform Module, smartcard USB token, biometric fingerprints and virtual tokens) to authenticate a user to a computer or network. I was particularly drawn to the concluding chart (see below) where it compares the “Level of Security” vs. “Administration Complexity”. Read More→

Comments Comments Off on Passwords are More Secure than Biometrics for Network Security
Jan
24

CIO’s Feel the Pressure to Optimize the Online Experience

Posted by: | Comments Comments Off on CIO’s Feel the Pressure to Optimize the Online Experience

In an exclusive survey, members of the CIO Forum on LinkedIn have weighed in on the business impact of application performance. These CIOs and IT leaders say they directly associate application performance with end-user and customer satisfaction, along with the potential to increase productivity and lower costs.

In a whitepaper sponsored by CA Technology, “CIO’s Feel the Pressure to Optimize the Online Experience” they conclude that when it comes to computer business applications, there are four areas to achieve buy-in from business leaders: Read More→

Comments Comments Off on CIO’s Feel the Pressure to Optimize the Online Experience
Jan
19

A Found USB Drive Is Not a Safe USB Drive

Posted by: | Comments Comments Off on A Found USB Drive Is Not a Safe USB Drive

A Found USB Drive is Not a Safe USB Drive by Dovell BonnettRecently, I was told of an incident where an employee of a fairly large company spotted a USB stick on the pavement in the parking garage. Concerned that it might be important information of a colleague, the employee picks up the stick and takes it back to his office. To determine who is the owner, the employee inserts the drive into his computer and opens up the folders thinking that its contents will identify the owner. Read More→

Comments Comments Off on A Found USB Drive Is Not a Safe USB Drive
Jan
18

Keep Your Enemies Close, but Your Friends Closer

Posted by: | Comments Comments Off on Keep Your Enemies Close, but Your Friends Closer

Our government seems to have problems securing both our physical and virtual boarders. It seems that when it comes to cyber security all the old paradigms have turned upside down. In the recent article “Indian Intelligence Have U.S. Government Passwords, Hacker Claim” has proof that the Indian intelligence is spying on the US government. One of the main culprits for accessing government data files is weak passwords. Power LogOn by Access Smart can take an existing PIV/CAC card and add on secure password management without any re-badging or re-issuance of cards, employees can self-enroll from their office, and licenses are transferable to handle employee turnover. With the purchase of the Power LogOn Starter Kit for $400, IT can perform a complete test/pilot in a matter of hours and not months/years. To learn more about extending your current government credential, please see our post “Why rebadge when you can extend functions?”

Comments Comments Off on Keep Your Enemies Close, but Your Friends Closer
FLEXCAP
SiteLock