Online File Sharing And The Importance Of Security

Computer-Virus-Statistics

Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at the office all night. As a trusted member of your company, you are authorized to view this type of

Enjoy Full Article

Coke’s Internal Data Breach – Lessons Learned

ScottWalters

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and

Enjoy Full Article

Cloud Infographic: Risky Data

security-infographic-information

Cloud Infographic: Risky Data Regulatory compliance and risk of a data breach are forcing financial institutions to implement more stringent policies and procedures. With the cost of a security breach far outweighing the cost of a solution, the benefits of Single Sign-On (SSO) and strong authentication are too significant to pass up. If you are

Enjoy Full Article

Trend Micro Predicts Cyber Security Concerns For 2014 And Beyond

Blurring-Boundaries

Trend Micro Predicts Cyber Security Concerns for 2014 and Beyond Mobile threats, targeted attacks and vulnerabilities for the Internet of Everything highlighted DALLAS, Dec. 9, 2013 – Trend Micro Incorporated (TYO: 4704; TSE: 4704) today released its annual security predictions report, “Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond.” The outlook cites that one major

Enjoy Full Article

Understanding Twitter’s Security Enhancements

attacks-twitter

Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies,

Enjoy Full Article

Security Considerations While Moving To The Cloud

big-data-fraud

Security Considerations While Moving To The Cloud It is always difficult to maintain in-house IT operations at the cutting edge of efficiency. Whether it is a question of getting enough budgets approved or keeping all stakeholders happy, life for technical managers is never easy. On the other hand, clouds have certain inherent advantages. Big cost

Enjoy Full Article

5 Reasons Why The Cloud Is Still Not 100% Secure

crime-cyber

5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals

Enjoy Full Article

What PCI DSS 3.0 Means For Cloud Service Providers

C J Radford - Data

What PCI DSS 3.0 Means For Cloud Service Providers The only constant is change. Earlier this month, the Payment Card Industry Security Standards Council released version 3.0 of the PCI DSS standard (along with the accompany Payment Application Data Security Standard).  In it are a few key focus areas that will directly affect Cloud Service

Enjoy Full Article

Symantec Report Keeps Cloud Users Security-Savvy

cybercrime-report

Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat

Enjoy Full Article

Firehost Reveals Increases In Cyberattacks In Its Superfecta Report

Chart

Firehost Reveals Increases in Cyberattacks in its Superfecta Report There are always wolves at the door, and they are relentless in both their creativity and determination when it comes to getting in. This is the message that can be gleaned from a report released Tuesday October 22, by FireHost, (www.firehost.com) a provider of managed, secure

Enjoy Full Article