Why Your Business Requires Security

The States and Federal Identity Theft and Privacy Protection Laws now require businesses, agencies and organizations of all sizes to protect all personal information they store, and report to all their customers whenever a breach occurs. The financial ramifications after having a data breach can be very substantial to both present and future business. In some many cases a company never does recover from a breach and is forced to close down. Currently, the average cost on a company is $3.7M per incident.
Sep
19

Secure Corporate Networks with Password Management

By · Comments Comments Off on Secure Corporate Networks with Password Management

The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have. The difference is that criminals now have a global reach, just as businesses do. In the U.S. at least, the responsibility for protecting consumers from having their personal information pilfered is placed upon businesses. Read More→

Categories : Uncategorized
Comments Comments Off on Secure Corporate Networks with Password Management
Sep
18

Passwords are More Secure than Biometrics for Network Security

By · Comments Comments Off on Passwords are More Secure than Biometrics for Network Security

A Hewlett-Packard’s white paper “HP ProtectTools: Authentication technologies and suitability to task“, 06/2005, does a very good job discussing the different security technologies available (Passwords, Trusted Platform Module, smartcard USB token, biometric fingerprints and virtual tokens) to authenticate a user to a computer or network. I was particularly drawn to the concluding chart (see below) where it compares the “Level of Security” vs. “Administration Complexity”. Read More→

Comments Comments Off on Passwords are More Secure than Biometrics for Network Security
Sep
09

IT Security Rules Facilitate Data Breaches

By · Comments Comments Off on IT Security Rules Facilitate Data Breaches

We all have been told by Corporate IT that we must have complex passwords, they must have a minimum of eight characters, don’t use the same password for other sites, and change them every 60- to 90-days. While these may seem like great practices, these rules could facilitate a security breach. Read More→

Comments Comments Off on IT Security Rules Facilitate Data Breaches
Sep
01

Securing Security Challenges

By · Comments Comments Off on Securing Security Challenges
Have you ever seen those security challenge questions on websites to help authenticate you?
 
• Which bank branch do you live closest too? • What car do you wish you owned?  • What is your favorite food? • Who is your favorite book character? • What is your favorite game or sport? • What is your favorite movie? • What is your favorite pizza topping? • What is your favorite restaurant? • What is your favorite season of the year? • What is your favorite sports team? • In which department did you first work? • What was your first position in the company? • What was your first car? etc. Read More→
Comments Comments Off on Securing Security Challenges
Jul
22

Found USB Drive in Parking Lot

By · Comments Comments Off on Found USB Drive in Parking Lot

I was recently told of a story of an incident that happened a few weeks ago. However, this is not the first time I have heard the tale. An employee is walking through the parking lot and finds a USB stick on the ground. Fearful that it might be important information of a colleague, the employee picks up the stick and takes it back to his office. To determine who is the owner, the employee inserts the drive into his computer and opens up the folders thinking that its contents will identify the owner.

WAM – the entire company’s network is infected with a new virus that the anti-virus program did not recognize.

The dropping of virus seeds in the way of USB drives is a very common attack. Drives are left in corporate lobbies, doctor’s offices, parking lots, restaurants, any place where people gather. The thieves are counting on Good Samaritans to help their follow man or woman.

Employers need to inform their employees of the following procedures:

1. If they find a USB drive never have them put it into their computer

2. They should give the drive to IT to determine what they want to do with it.

3. If there is no IT dept either drob the drive into the garbage or first smash it with a hammer before dropping it into the garbage.

4. Don’t worry that someone will loose important data. They probably have backup and if they don’t they soon will; and if there was confidential data on the device you just saved the company’s customers from a data breach.

Comments Comments Off on Found USB Drive in Parking Lot
FLEXCAP
SiteLock