Netflix: Use Our Hack-Scanning Software
Though it might be most famous its binge-watch streaming service, Netflix has produced open source tools that can protect businesses from data breaches and DDoS attacks.According to The Register,...
View ArticleNude Photo Leak Raises Question of What a Data Breach Is
While the hacking of Jennifer Lawrence, Kate Upton, and other celebrities' iCloud accounts has produced endless commentary, there's a big issue that IT professionals should be paying attention to: what...
View ArticleCan Insurance Protect Digital Assets?
Many of our clients wonder whether digital assets, such as data, digital media, and other intangibles, are covered by insurance. The answer to that question – like many things in the insurance world –...
View Article91% of Businesses Underestimate the Number of Cyber Threats They Face
If you had to pick a number, how many new variants of malware do you think threaten businesses each day? That was the question posed to roughly 4,000 IT professionals in a new data security survey from...
View ArticleSurvey: Most Companies Still Counting Too Much on Antivirus Software
Kaspersky Labs released a report on IT risk management, and the numbers are alarming enough to strike fear into the hearts of IT professionals. Or, at the very least, the report will certainly leave...
View ArticleBanking Trojans: Not Just for Banks Anymore
Innovation is the name of the game in IT, but the same holds true in the seedy world of cyber crime, where hackers are always changing their strategies and finding new ways to use old malware. Let's...
View ArticleApple & Google: We Won't Snitch
In moves that acknowledge public distrust of police and government agencies following Edward Snowden's "big reveal," two leading smartphone providers – Apple and Google – have upped their security,...
View ArticleHome Depot Data Breach Already Causing Customer Losses
The Star’s report on Home Depot's data breach shows just how quickly cyber criminals can make a profit from a cyber attack. The hackers have already used stolen data to drain bank accounts, purchase...
View ArticleIn Data Security, Compliance Isn't Enough
The Telegraph reports a paradigm shift taking place among IT industry leaders: more data security consultants are realizing that merely complying with security regulations isn't enough to protect...
View ArticleA Simple Way to Keep Your Clients' Data Safer? (Bonus: It Might Help...
USA Today reports on the new app Authy, which offers a two-factor authentication service that developers can easily integrate into websites and web apps.But what is two-factor authentication (2FA)?...
View ArticleLoss, Theft of Devices Still Among the Most Common Data Breaches
The Dallas Morning News details a recent data breach in which a number of laptops with patient records were stolen from the back of city ambulances between 2011 and 2014. Do stolen computers count as...
View ArticlePOODLE Vulnerability Could Spell Trouble for Small Businesses that Use BYOD
Wired reports on a new vulnerability: POODLE. Though it may sound cute, it allows hackers to gain access to user accounts if they are on the same open Wi-Fi network. Talk about a bad dog.POODLE...
View ArticleThe Free Security Tool Your Clients Probably Aren't Using
As IT security blogger Brian Krebs reports, last week saw a wave of critical security updates to Microsoft Windows, Java, and two Adobe programs.Your clients might not realize that by delaying an...
View ArticleSome Small IT Biz Inspiration to Remind You Why You Do This
ZDNet's blog analyzes the tech media's response to the alleged hack of Dropbox and finds that many security recommendations offered by bloggers fall short. As it turns out, Dropbox was never hacked....
View ArticlePhishing by the Dock of eBay
CIO Today reports eBay was hacked…again. Over the summer, nearly 145 million passwords were exposed, but this time hackers used a different approach to harvest data.Because eBay allows JavaScript and...
View ArticleBeyond Passwords and PINs
From an IT perspective, a password or PIN is not a hallmark of security – it's a necessary evil. Ideally, there'd be a more secure way of encrypting and transferring data, but as it is, we're stuck...
View ArticleThe Least Fun Way to Spend that Extra $9,000
As an IT professional, you've undoubtedly worked with clients who won't commit an adequate amount of resources to data security. Many small-business owners simply don't think it's worth the extra money...
View ArticleWhy the 31% of Businesses without Cyber Insurance Should Scare You
Insurance Journal reports on a study that shows 60 percent of businesses think cyber risks are very high for them, but 31 percent still have no Cyber Liability Insurance whatsoever.You might be...
View ArticleiOS Malware Accesses Devices through Third-Party App Stores
Apple earned its sterling reputation for device security in part because iOS hadn't been hacked by malware. However, the company's reputation recently took a hit when a new strain of malware called...
View Article62% of Americans Worry about Smartphone Hacking; 53% Don't Secure Their Phones
According to a new Gallup poll, cyber crime is now the crime that most Americans worry about it. The new survey shows these startling numbers:69 percent of Americans worry about having their credit...
View Article