Security and Longline Phishing Attacks

Just as new technologies are changing the workplace, new technologies and methodologies are also advancing among cybercriminals. The recent attacks at Target, Neiman Marcus and others utilized a combination of highly-sophisticated attacks that incorporated social engineering, parsing malware, and more. More and more businesses face the threat of advanced attacks like longline phishing. Proofpoint coined […]

Network Protection through Asset Inventory Control

Understanding and managing device access to your network is an essential safety control for the ongoing security of your network. According to the Center for Strategic & International Studies (CSIS), asset inventory control tops the list of 20 critical security control that can help agencies and business block the most frequent attacks. [1] Established in 2008, […]

Detecting a Computer Virus

At least 16 million U.S. households have suffered a computer virus in the last two years. In spite of the proliferation of antivirus software, families and businesses alike suffer from viruses, worms, phishing, password stealing attacks and more. It is estimated that computer viruses, spyware and phishing have cost U.S. households $4.55 billion dollars.[1] While […]

Security: Are Software Companies to Blame?

A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]

Data Breaches: 20 Critical Security Controls

The Verizon Data Breach Investigations Report makes it clear that each organization needs to implement a multi-faceted security solution to address the range of potential threats. Verizon points out that a one-size-fits-all security package is not a solution. Each organization has unique challenges based on type and size of company, processes and procedures, budget, and other […]

Four Trends that Continue to Shape SMBs

The economic challenges of the last several years caused many SMBs to move cautiously with technology investments. At the same time, small business owners are trying to find ways to compete more effectively, cut costs, and adapt to the changing markets. Technology offers potential ways for SMBs to achieve business goals. With tighter budgets and […]

Cybertheft of Intellectual Property

In a report on Intellectual Property (IP), CSO suggested that cybertheft is a serious threat for businesses around the world. They wrote, The next big target for cyber-criminals, state governments, organized crime and hackers is IP. One stolen manufacturing process can be worth millions in saved development costs or billions in market share. Estimates show […]