A Reminder From Yahoo: Change (And Improve) Your Passwords

YahooLogo

On January 31, 2014, Yahoo announced that a major theft of mail account passwords had compromised an “ undisclosed number” of accounts. Writing from the Yahoo Tumblr blog, senior vice president in charge of Yahoo’s platforms and personalization products, Jay Rossiter, pointed out the attack was a result of a third-party database being compromised, and not

Enjoy Full Article

Cloud Infographic: Biggest Security Breaches Of 2013

CIO-Tech

Cloud Infographic: Biggest Security Breaches Of 2013 There has been much discussion on security breaches over the last several months. This will continue to be the hot topic in 2014 as companies look for ways to thwart the increase in cybercrime. Provided is an infographic by Marble Security outlining the biggest security breaches of 2013.

Enjoy Full Article

3 Ways To Protect Your Financial Data

data-protect

3 Ways To Protect Your Financial Data Recent retail foibles have us all a bit on edge about our personal data. High-profile security breaches at Target and on SnapChat remind us it can happen anywhere, to anyone. It leaves us marveling a bit (not in a good way) at how a simple transaction can cause

Enjoy Full Article

Good Bots And Bad Bots Online: They Outnumber Us

bot-traffic-report-2013

Good Bots And Bad Bots Online: They Outnumber Us Bots account for 61.5% of all Internet traffic, according to a new infographic published by online data security company Incapsula. This represents a 21% increase over the past year, and it signifies not only an increase in automated web traffic, but a significant increase in activity

Enjoy Full Article

Cloud Infographic: Is Your Password Safe On The Cloud?

password-cloud

Cloud Infographic: Is Your Password Safe On The Cloud? In the modern world of Internet connectivity, cloud computing, online banking, social networking, personal privacy and information security is essentially dependent upon password protection. Passwords are the crucial barrier that safeguards the personal information contained in the perhaps dozens of accounts that we interact with every

Enjoy Full Article

Let’s Talk Workspace Cloud Security!

workplace-security

Let’s Talk Workspace Cloud Security! Let’s face it, security most likely tops the list for IT challenges and now with cloud technology’s significant expansion over the years and the increase of personal devices, also known as BYOD, being used in and outside the workplace, the challenges have gotten that much more intense. As per BT.com’s

Enjoy Full Article

5 Reasons Why The Cloud Is Still Not 100% Secure

crime-cyber

5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals

Enjoy Full Article

Symantec Report Keeps Cloud Users Security-Savvy

cybercrime-report

Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat

Enjoy Full Article

Cloud Infographic: Cybercrime

cloud-security-infographic

Cloud Infographic: Cybercrime To close out this weeks coverage on Cloud security and Cybercrime, we’ve opted to include an older infographic which sums up this week nicely entitled: “Are You A Hacker’s Target?“. This infographic is provided courtesy of Solera Networks. Infographic Source: Solera Networks

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

incapsula

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts receiving Distributed Denial of Service (DDoS) attacks that are carefully timed to re-strike just as their systems start to repair themselves. The

Enjoy Full Article