Archives: 'IT Security'

Doug Bedell — October 18, 2017, 11:06 am

October: ‘National Cyber Security Awareness Month’

The Department of Homeland Security advises that October is “National Cyber Security Awareness Month”. That makes it a good time to provide a renewed list of cybersecurity safety tips. They come down to be alert, be updated, and love those passwords! Seriously, cybersecurity is requiring increasing attention, and will continue to do so.

Doug Bedell — September 22, 2017, 12:10 pm

Computer Hacking: A Top-Ranking Security Concern

Evidence that the security of using the Internet is a growing concern comes in a Dark Reading post headed “Americans Rank Criminal Hacking as Their Number One Threat”. Criminal hacking scored above air pollution and disposal of hazardous waste in landfills as concerns of the 740 respondents in an online survey. “It’s pure speculation on […]

Doug Bedell — September 18, 2017, 11:01 pm

Security Lesson: Pay Heed to the Equifax Data Breach

Equifax, a consumer credit reporting agency in Atlanta, GA, is just about the worst sort of enterprise to be hacked, from the public’s point of view. But it was. “The more than 143 million consumer credit records hacked from Atlanta-based Equifax during May, June and July,” Security InfoWatch reports, “saw all sorts of personal data […]

Doug Bedell — September 15, 2017, 11:53 am

Vigilance Matters Greatly In Heading Off Security Breaches

So there is Equifax, with a security breach in which, notes the Security magazine blog, “thieves made off with highly sensitive personal information including the Social Security and credit card numbers of at least 143 million people.” “The most troubling aspect of this data breach,” Security tellingly adds, “is that it was likely to have […]

Doug Bedell — September 8, 2017, 10:20 am

Taking Cyber Security Seriously With an SOC of Your OWN

We’ve been talking about organizations taking digital security seriously at a time of rising cyber threats. So, just came upon a post on the Security blog about installing a Security Operations Center (SOC) in your organization. They can be from rudimentary to sweeping in size and complexity – but at any level, an SOC is […]

Doug Bedell — September 1, 2017, 9:45 am

Security Challenges on the ‘Internet of Things’

Keeping up with our increasingly digital world can be taxing, as with security risks on the Internet of Things (IoT). Quoting the global consulting firm McKinsey, the Security Ledger blog advises that “More than three-quarters of managers surveyed said Internet of Things security is a top priority but just 16% said their company was ‘well […]

Doug Bedell — August 23, 2017, 10:20 am

Out-of-Date Software a Big Computer Security Risk

When hospitals in the United Kingdom focused on what had left them defenseless in a recent computer hacking attack, administrators realized they were running Windows XP, which was out of date and vulnerable to attacks. Thus the Clearswift blog advises that “Running critical infrastructure on outdated software is incredibly risky.” In the UK, “It was […]

Doug Bedell — August 3, 2017, 8:43 am

Mobile Employees Can Pose Cyber Security Risks

Many business offices are functioning as though they don’t have walls, the Clearswift cyber security blog notes. That’s because their increasingly mobile employees are using portable computers, iPads and cellphones for business purposes. And those mobile devices may not be as secure as their office counterparts. So how do we insure the security of out-of-office […]

Doug Bedell — July 31, 2017, 1:32 pm

Caught on the ‘Dark Web’ by Carelessness Over Passwords

The ‘Dark Web’ is defined as the part of the World Wide Web “that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.” That is, if the scamers use their passwords correctly. Naked Security reports on some digital predators in the Netherlands who found their sites […]

Doug Bedell — July 28, 2017, 11:02 am

Security’s Realities, Both Physical and Digital

On the Security blog, Kevin Coleman, a security authority and visionary, identifies “the top five drivers of current approaches and strategies for security.” They are both physical and digital. For PRO Barrier, whose expertise is primarily in entrance and perimeter security, the most pertinent of Coleman’s concerns is “obsolete/inadequate physical and digital perimeter protection capabilities.” […]