Encryption is an essential tool in keeping data safe. It’s not the whole answer, though, and the Internet is full of misleading information about it. Sometimes it’s portrayed as a magic bullet, sometimes as a waste of time. Truth is always more complicated than myths, so let’s look at a few myths and get a perspective on them. Continue Reading
Keeping a business’s computers secure is a complicated job. It involves firewalls, security software, spam filtering, router configuration, VPNs, and more. What if you could put it all together and have one security product that covered all the bases? That’s what unified threat management (UTM) offers.
UTM can come in a hardware appliance or a software package. A UTM appliance is typically a router and firewall in one box, with additional functions to handle all aspects of security. UTM software provides a suite of applications which the administrator can manage through a console. Some cloud UTM services are available, though they aren’t common yet. Continue Reading
In order to control the use of internet in their homes, some people go the lengths of actually unplugging the router after hours. Parents often take extreme measures to control children’s use of internet because they know that both the stimulation from continuous internet use and particular troublesome content will have a bad effect on children’s attitudes and development. The internet is a wonderful educational tool. Schools increasingly expect children to use it to support their learning. However, in many ways, the internet is like a city street and after hours it may have a dark side. Continue Reading
Believe it or not, the business world can be very unpredictable. Sometimes, it’s best to expect the unexpected. Customers come and go, your business plans may change suddenly, or the company could end up having budget issues. With that said, this is why it’s important to have a contingency plan for these incidents. After all, the way you’re running things in the workplace, may be subject to change in a few years. Generally speaking, that’s the nature of owning a business. Continue Reading
Endpoint security is defined as the process of securing various endpoints on a data network, often involving end-user devices like mobile phones, iPads, desktop PCs, and laptops. Additionally, hardware can also be considered an endpoint. An example of this would be servers in the data center. An exact definition of an endpoint largely depends on who you ask, as every security leader has a different idea. Basically, though, endpoint security tackles those risks that are presented by various devices connecting to a main network. Continue Reading
When you’re working at a business, it’s always important to be knowledgeable of the tips and tricks hackers can use to steal your information. Whether they’re setting up a fake website that asks you to enter your social security number, or are sending you an email that appears to be from a coworker, there’s more to protecting your network than simply having the right security. You have to be aware of the ways your information can be stolen as well. With that said, ransomware is one of the most dangerous programs, and should be prevented at all costs. Continue Reading
We don’t like to think about disasters, but preparing for them is better than ignoring them. FEMA estimates that 40% of businesses that experience a disaster never open again, and 25% last no more than a year after that. One of the big reasons for this is data loss. If a fire or hurricane destroys a business’s data records beyond recovery, the chances of putting the pieces back together are poor. However, a business with a disaster recovery plan can make it through a catastrophe with its data intact and get up and running quickly. Continue Reading
You may have encountered the term “whaling” when IT people talk about spam email. It’s like phishing, but it directs its bait at really big prey.
Phishing is email designed to trick people by pretending to come from a legitimate source. The sender hopes the victim will open an attachment, click a link, divulge a password, or otherwise do something that will open a security hole which the attacker can exploit. Often it directs the recipient at a website that impersonates a government agency or business. Continue Reading
Since September 2013, when the ransomware plague was unleashed on the internet in the form of CryptoLocker and its copycats, to the time of this post, there are now well over a hundred different strains and the end is not in sight. Ransomware has proven to be a highly successful criminal business model and many aspiring cybercriminals big and small are now trying to muscle into this racket. Continue Reading
Cell phone users are making really bad decisions compared to their desktop computing counterparts.
The study’s data is reveals the harsh truth. Cell phone users are three times more likely than users of desktop computers to offer up confidential login details to a phishing site, and they are also quicker to respond to phishing scams.
Rather controversially, Trusteer, the research company, claims iPhone users are the most foolish of all, accessing phishing Websites more than BlackBerry users by a factor of eight. This is especially galling bearing in mind BlackBerry is still a market leader in the US, with 36 percent of the smarphone market in October 2010 compared to the iPhone’s 25 percent. In other words, iPhone users appear to be making extra special efforts to be dumb.
Adapted via Yahoo News