1.888.749.9800

Yearly Archives: 2016

How are Hackers Tricking Social Media Users?

One of the most popular exploitation methods used by hackers when targeting social media users is social engineering. Using confidence tricks, a hacker can manipulate his target into performing actions or disclosing confidential information. If pulled off successfully, a social engineering attack could result in a hacker gaining complete access to its target’s social media account with little effort.

One […]

By |December 20th, 2016|Blog|Comments Off on How are Hackers Tricking Social Media Users?

What Exactly Does the Future of IoT Security Hold?

Picking up on the conversation from my previous post, the Internet of Things continues to pose challenges for many manufactures as they now have to think about network security for new versions of their products.

One of the worries about the future of the Internet of Things (IoT) is that many of the manufactures that are […]

By |December 12th, 2016|Blog, Security Breach|Comments Off on What Exactly Does the Future of IoT Security Hold?

Security Implications of Connected Consumer Electronics

I’d like to pose a question: What do you think the security implications of connecting various popular IoT consumer electronic devices is?

A) No harder than it was for other new devices like laptops, wireless connections and smartphones, or

B) No easier than it was for previous new devices.

The answer is […]

By |November 30th, 2016|Blog, Security Breach|Comments Off on Security Implications of Connected Consumer Electronics
  • Permalink Gallery

    Want a board-level cybersecurity expert? They’re hard to find

Want a board-level cybersecurity expert? They’re hard to find

by Alan R. Earls, TechTarget, SearchSecurity, November 16, 2016

Members of the board must be ready to defend their fiduciary decisions, corporate policies, compliance actions and, soon, cybersecurity preparedness.

Pity the corporate board. Not that long ago, many boards of directors had a relatively sleepy existence, proffering guidance from time to time, but actually taking action only in the rarest of circumstances.

Nowadays, boards […]

By |November 16th, 2016|News & Events|Comments Off on Want a board-level cybersecurity expert? They’re hard to find

Risks of Plugging a Smartphone Into a Public USB Port

As smartphones continue to increase in popularity, people can find USB charging stations in almost any location. From airports to malls, businesses are offering their customers a convenient way to keep a full charge. Without much thought, most people are quick to plug their devices into any random USB port that they might find, but doing so […]

By |November 14th, 2016|Blog, Security Breach|Comments Off on Risks of Plugging a Smartphone Into a Public USB Port

Social Media Security Tips and Best Practices

In response to a recent query about security pitfalls surrounding social media, Jonathan Shuffler and I came up with the following tips and best practices:

  • When setting account security questions, do not use real answers.  A lot of security questions ask publicly available information, e.g., What is your favorite sports team?  An attacker would need only a […]
By |October 31st, 2016|Blog|Comments Off on Social Media Security Tips and Best Practices
  • Permalink Gallery

    Important Tip for Companies Looking to Protect Unstructured Data

Important Tip for Companies Looking to Protect Unstructured Data

Most companies are very good at protecting data that they know about and consider sensitive – they restrict access to the HR systems where compensation data is available.  They put access controls and monitoring procedures on systems that store critical intellectual property like formulas or key financial analytics.

Typically, they have formal policies and associated technology […]

By |October 19th, 2016|Blog, Security Breach|Comments Off on Important Tip for Companies Looking to Protect Unstructured Data
  • Permalink Gallery

    Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

Down but not out of options: How to keep IT security together in a company that’s gone bankrupt

by Josh Fruhlinger, CSO, October 7, 2016

Corporate chaos

The supply chain upon which modern multinational commerce depends was thrown into chaos earlier this year when South Korea’s Hanjin Shipping filed for bankruptcy. Dozens of container ships with hundreds of crew and thousands of pounds of cargo onboard were essentially stranded at sea, as ports barred the ships’ entry […]

By |October 7th, 2016|News & Events, Security Breach|Comments Off on Down but not out of options: How to keep IT security together in a company that’s gone bankrupt
  • Permalink Gallery

    Cyber Security Investments: Experts Discuss Detection vs. Prevention

Cyber Security Investments: Experts Discuss Detection vs. Prevention

by Nate Lord, Digital Guardian, September 26, 2016

Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments.

Enterprises are increasingly aware of the growing need to invest in sound security measures capable of securing valuable company data in the ever-evolving threat landscape. But in the face of budget constraints, some companies find themselves […]

By |September 27th, 2016|News & Events, Security Breach|Comments Off on Cyber Security Investments: Experts Discuss Detection vs. Prevention

Important Sources of Threat Intelligence for Security Teams

The goal of threat intelligence (TI) is to recognize indicators of attacks as they progress and act upon those indicators in a timely manner. TI is not a mature area for most organizations.

While tools to automate TI exist and are evolving, most organizations are still using informal ad hoc mechanisms or a small number […]

By |September 26th, 2016|Blog, Security Breach|Comments Off on Important Sources of Threat Intelligence for Security Teams

Cybersecurity Responsibilities for SMBs

Cybersecurity is a topic that many small and most medium-sized businesses care about due to all of the news stories about data breaches, identity theft, and ransomware that have appeared in the last several years.  Some small and medium-sized businesses have realized that having a strong cybersecurity program can be a strategic asset for their particular market […]

By |September 9th, 2016|Blog, Security Breach|Comments Off on Cybersecurity Responsibilities for SMBs

Cybersecurity by Segregation

With recent news of Singapore disconnecting its government networks from internet access, and now requiring civil servants to use separate computers, I was asked to comment on the security issues this cybersecurity segregation will cause.

Deciding to disconnect from the Internet is clearly a difficult decision and more than likely a result of a reaction to […]

By |August 23rd, 2016|Blog, Security Breach|Comments Off on Cybersecurity by Segregation
  • Permalink Gallery

    A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

by Kim Slowey, Construction DIVE, August 11, 2016

Construction companies are infamous for their reluctance to adopt the latest technologies. Most of the largest companies have made the leap, but for small and mid-sized firms, the process continues inch by inch.

However, as contractors join the digital age and begin to reap the benefits of becoming more connected with fellow […]

By |August 11th, 2016|News & Events, Security Breach|Comments Off on A future ‘hot target’ for attackers: How construction companies can improve cybersecurity

IoT Hidden Security Risks

While the security of IoT devices is a growing area of concern for the enterprise, the biggest IoT risk for businesses is if they decide to react to IoT issues rather than plan and prepare for them. Everybody knows that the earlier in a cycle you can deal with a problem, the less expensive it […]

By |August 10th, 2016|Blog, Security Breach|Comments Off on IoT Hidden Security Risks

The Brave New World Of Cloud Application Security

by Teresa Meek, Workday Contributor, Forbes, August 3, 2016

As businesses continue their flight to the cloud, their concerns about security are changing. The cloud can offer companies better security than their own data centers — but only if they understand how to manage the responsibilities that come with it.

What Smaller Businesses Can’t Do

For years, security concerns kept companies from migrating their data […]

By |August 4th, 2016|Big Data, News & Events|Comments Off on The Brave New World Of Cloud Application Security