Archives: 'IT Security'

Doug Bedell — June 17, 2019, 8:11 am

Images Are Now a Source of Computer Security Attacks

The Clearswift blog explains how PDF files have become computer security risks. “Any sensitive or confidential document can be readily copied into a PDF and sent out of the organization without being detected.” The Clearswift post explains how this risk develops. It’s fairly intricate, but well worth understanding. “A new generation of threats is emerging […]

Doug Bedell — May 24, 2019, 2:52 pm

Computer Data Breaches Leave Us Yearning for Digital Security

Security Infowatch notes that there’s a “patchwork of state data breach notification statutes, as well as federal laws” that are supposed to promote the security of documents housed on computers. Yet “massive data breaches have gotten more common in the years since these statutes were enacted.” The “constant drumbeat” of news about about hacking “has […]

Doug Bedell — May 20, 2019, 12:02 pm

Watch Out: Social Media Breaches Weaken Web Security

Here’s a look at what happens, and why, when Facebook gets its dander up enough to shut down accounts “being used to spread fake news and influence political discourse in a number of nations,(in this case) mostly in Africa, but also in latin America and Southeast Asia. “Before the ban, Archimedes Group was running 65 […]

Doug Bedell — May 17, 2019, 10:44 am

Email Security: Practice It As a Speciality Of Its Own

Here, from Securosis, is background on email security – “…email-borne attacks are still a scourge on pretty much every enterprise. That doesn’t mean the industry hasn’t made progress – it’s just that between new attacker tactics and the eternal fallibility of humans clicking on things, we’re arguably in about the same place we’ve been all […]

Doug Bedell — May 8, 2019, 1:17 pm

Take Cyber Security Risks for Businesses Seriously

We post a lot about cyber security threats, but here’s an especially important one – cyber security training for the staff of a business, those who have to recognize the possibility that an attack is occurring in the first place. Clearswift.com advises: “As a starting point, employers need to work to create an environment that […]

Doug Bedell — April 29, 2019, 6:59 am

As Threats Grow, Cybersecurity Needs More Pros

Cybersecurity professionals need help, there aren’t enough of them. That’s the word on SecurityInfowatch.com. “We absolutely need more cybersecurity professionals that are trained properly and can protect our world,” says National Security Agency Director Harry Coker Jr. “Nationally, we’re experiencing a 12-year high in the cybersecurity expertise gap, and it’s not because we’re producing fewer […]

Doug Bedell — April 19, 2019, 9:14 am

Tensions Remain Constant Over Trust In the Internet

In Homeland Security provides a snapshot of how “a group of government-backed hackers have taken over chunks of the Domain Name System (DNS), a crucial part of the Web’s infrastructure that’s often been compared to the phone book of the internet… “The researchers said it was one of the scarier attacks they’d seen, as it […]

Doug Bedell — April 17, 2019, 9:29 am

Bruce Schneier’s New Book on Internet Security Perils

You can’t spend much time on a computer anymore without recognizing that the possibilities for intrusion, even actual meddling, are growing. Digital security is an ever-increasing challenge. Bruce Schneier, bless him, has published a new book, “Click Here to Kill Everybody,” on internet perils. “Schneier explores the risks and security implications of our new, hyper-connected […]

Doug Bedell — April 10, 2019, 9:23 am

Protecting Corporate Data from Cyber Attack

Businesses, advises Clearswift.com, need to train employees to protect the data they have access to from hackers and other security intruders. “A well-trained employee should be able to answer the three data security questions, ‘What’, ‘Where’ and ‘How’: “• What data is considered valuable to the business (and therefore to cybercriminals)? “• Where is this […]

Doug Bedell — April 3, 2019, 4:23 pm

Bruce Schneier Recommends a Read, If you Have the Time, of Course

Bruce Schneier is such a renowned security guru that when he recommends immersion in a report like “Personal Data: Political Persuasion, Inside the influence Industry. How it works.”, we should all turn to it. Trouble is, the text is many pages long, so we can only recommend it if you have the time for sampling […]