Just as new technologies are changing the workplace, new technologies and methodologies are also advancing among cybercriminals. The recent attacks at Target, Neiman Marcus and others utilized a combination of highly-sophisticated attacks that incorporated social engineering, parsing malware, and more. More and more businesses face the threat of advanced attacks like longline phishing. Proofpoint coined […]
Watching Email Subject Lines

According to a recent Websense report, phishing campaigns dropped to 0.5 percent in 2013 (from 1.12 in 2012), but the campaigns have also become more sophisticated and targeted. [1] Phishing emails lure the receiver to respond by clicking a link and giving personal information to what appears to be a trusted source. These campaigns are […]
Network Protection through Asset Inventory Control

Understanding and managing device access to your network is an essential safety control for the ongoing security of your network. According to the Center for Strategic & International Studies (CSIS), asset inventory control tops the list of 20 critical security control that can help agencies and business block the most frequent attacks. [1] Established in 2008, […]
Detecting a Computer Virus

At least 16 million U.S. households have suffered a computer virus in the last two years. In spite of the proliferation of antivirus software, families and businesses alike suffer from viruses, worms, phishing, password stealing attacks and more. It is estimated that computer viruses, spyware and phishing have cost U.S. households $4.55 billion dollars.[1] While […]
Password Reminder

If you’re not using a password reminder, then it’s likely that you’re using the same memorable passwords for several websites; either that, or you have a stack of stickies hanging by your desk. In both cases, you may not be keeping your online information secure. Lack of password complexity as well as lack of multi-factor […]
Security: Are Software Companies to Blame?

A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]
Importance of Changing Passwords

Weak Passwords If a user has a weak password that is based on a simple pattern, then a password-cracking device may parse through a list of words and word variations quickly guessing that password. Some examples of weak passwords include (list below is adapted from Wikipedia): Default passwords like “password.” Words found in the dictionary. […]
Data Breaches: 20 Critical Security Controls

The Verizon Data Breach Investigations Report makes it clear that each organization needs to implement a multi-faceted security solution to address the range of potential threats. Verizon points out that a one-size-fits-all security package is not a solution. Each organization has unique challenges based on type and size of company, processes and procedures, budget, and other […]
Four Trends that Continue to Shape SMBs
The economic challenges of the last several years caused many SMBs to move cautiously with technology investments. At the same time, small business owners are trying to find ways to compete more effectively, cut costs, and adapt to the changing markets. Technology offers potential ways for SMBs to achieve business goals. With tighter budgets and […]
Cybertheft of Intellectual Property

In a report on Intellectual Property (IP), CSO suggested that cybertheft is a serious threat for businesses around the world. They wrote, The next big target for cyber-criminals, state governments, organized crime and hackers is IP. One stolen manufacturing process can be worth millions in saved development costs or billions in market share. Estimates show […]