Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.

Archive for Employee Security

Dec
29

How to Detect a Phishing Email

Posted by: | Comments Comments Off on How to Detect a Phishing Email

I recently received an email that looked like Microsoft was doing a campaign on its 25-year anniversary of Excel. If I would submit an article of my best Excel story, according to the email, I could win an X-Box.

My first thought was, “Has it really been 25-years and, boy do I have some great stories.” But looking over the email, something just didn’t seem right. Was this a phishing email? So here is my quick and easy test to determine if the email is a scam aimed at getting you to involuntarily give up your login and password information. Read More→

Comments Comments Off on How to Detect a Phishing Email
Dec
27

Are Govt. Websites Designed by Preschoolers?

Posted by: | Comments Comments Off on Are Govt. Websites Designed by Preschoolers?

It has been reported that Paul Ducklin, Head of Technology for Sophos, referred to the Lulz Security (LulzSec) hackers as “schoolboys.” He added that most of the break-ins were “languorously orchestrated, using nothing more sophisticated than entry-level automatic web database bug-finding tools, available for free online.” So are schoolboys hacking sites designed by preschoolers? Read More→

Comments Comments Off on Are Govt. Websites Designed by Preschoolers?
Dec
22

Common Password Pitfalls to Avoid

Posted by: | Comments Comments Off on Common Password Pitfalls to Avoid

Microsoft has an online report on creating and managing password security (see below). The suggestions would be funny if password security and cyber-crimes weren’t so serious and destructive to both individuals and businesses. What is also amusing is that Microsoft employees use smartcards to log into their computers and networks. I know because back in 2000 I designed and sold them the combinations physical and logical access employee badge with smartcard.

While I agree with their “Key to password strength”, what Microsoft and so many other companies fail to account for is the human element. Read More→

Comments Comments Off on Common Password Pitfalls to Avoid
Dec
20

Cloud Security – The SPYder and the Guy

Posted by: | Comments Comments Off on Cloud Security – The SPYder and the Guy

Cloud Security – A Poem

The SPYder and the Guy

By Dovell Bonnett (June 28, 2011)

 

“Welcome to my cloud?” said the SPYder to the Guy,
“‘Tis the cheapest little cloud that ever you will try;
The way into my cloud is to upload my link fare,
And I have many curious tools to show you while you are there.”
“Oh no, no,” said the Guy, “to ask me is in vain;
For those who link up to your cloud find that their data is never their own again.” Read More→

Comments Comments Off on Cloud Security – The SPYder and the Guy
Dec
13

More Hacking. When Will it Stop?

Posted by: | Comments Comments Off on More Hacking. When Will it Stop?

The simple answer? It won’t. To paraphrase Willie Sutton, bank robber, “That’s where the money is.”

PBS, Sony, Lockheed, Amazon, IMF, US Senate, etc., all announced in 2011 that their systems were hacked. Security specialists are now calling 2011 the year of the hacker. Weak SecureID tokens, malware, password attacks, etc., have all been used. Foreign governments, terrorists, drug cartels and a “hacking collective” called Lulz Security have been accused. Recently, the DOD announced that cyber attacks can now be regarded as a military attack with the recourse being military ordnance. Read More→

Comments Comments Off on More Hacking. When Will it Stop?
FLEXCAP
SiteLock