1.888.749.9800

Monthly Archives: April 2014

  • Permalink Gallery

    The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

By Thad Rueter,  Senior Editor,  InternetRETAILER,  April 9, 2014

The flaw could help hackers steal information, including credit card numbers and personal consumer data, from inside servers that operate e-commerce sites. But patches and other steps could help web merchants reduce any risk of fraud, experts say.

Big, huge, deeply worrying—but certainly not catastrophic if the right […]

By |April 28th, 2014|News & Events|Comments Off on The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety
  • Permalink Gallery

    Five Tips to Avoid the Pitfalls Mobile Developers Commonly Fall Into When Pushing out a Customer-Facing Mobile App

Five Tips to Avoid the Pitfalls Mobile Developers Commonly Fall Into When Pushing out a Customer-Facing Mobile App

Developers of mobile applications must address all of the security concerns that traditional application developers do, and they must also handle additional concerns. The most popular mobile device platforms use modern operating systems that were designed with security in mind from the initial stages.  However, developers still need to understand the unique threats and issues imposed by mobile platforms. […]

By |April 23rd, 2014|Blog|Comments Off on Five Tips to Avoid the Pitfalls Mobile Developers Commonly Fall Into When Pushing out a Customer-Facing Mobile App

The Heartbleed Bug — Commentary by Paul Hill

by Cooper Smith – Business Insider

A major flaw in the popular OpenSSL software library, which many Internet companies use to encrypt sensitive data, could leave online shoppers vulnerable to credit card theft. “Potentially everything is at risk,” said Paul Hill, a senior consultant at SystemExperts, IT compliance and security consultancy. After learning about the bug, Amazon, eBay, Etsy, and other […]

By |April 23rd, 2014|News & Events|Comments Off on The Heartbleed Bug — Commentary by Paul Hill
  • Permalink Gallery

    Privilege creep: Do your employees have more IT access than they need?

Privilege creep: Do your employees have more IT access than they need?

By James Ritchie

As employees move up and around in your organization, they likely end up with more responsibility, more influence — and more access to your IT infrastructure.

The phenomenon is known as privilege creep. As people switch roles in a company, they get login or admin privileges for new systems while retaining access to old ones. It leaves your […]

By |April 8th, 2014|News & Events|Comments Off on Privilege creep: Do your employees have more IT access than they need?
  • Permalink Gallery

    Getting Your Employees to Buy into Your BYOD Security Policy

Getting Your Employees to Buy into Your BYOD Security Policy

Getting your employees to buy into your BYOD security policy can be challenging. I was recently asked by Sue Poremba, Business News Daily, what pieces of advice I could share with employers to get employees to follow the company’s BYOD security policies. In addition to the tips includes in Sue’s article, I’d like to share my thoughts […]

By |April 8th, 2014|Blog, BYOD|Comments Off on Getting Your Employees to Buy into Your BYOD Security Policy

BYOD Security: Getting Employees to Buy In

By Sue Marquette Poremba

Do you have a Bring Your Own Device (BYOD) security policy in place for your company? If you do, your employees may not be too happy about it: A recent report by technology research firm Gartner found that one-fifth of BYOD policies fail because employees find the rules too restrictive and don’t bother to follow them.

BYOD gives […]

By |April 7th, 2014|BYOD, News & Events|Comments Off on BYOD Security: Getting Employees to Buy In