Would You Hire This Hacker?
Convicted hacker Robert Moore started serving his two-year prison sentence yesterday. He has high hopes that a security company will scoop him up when he gets out. The question is: Would you hire this man?
Disaster Recovery: Plan for Recovery, Not for Disaster
So many elements to business IT operations -- so many elements that can get sliced, diced, slammed, flooded, flamed, hacked, attacked, smashed and just plain hammered that your disaster recovery plan has to be universal to be effective.
Getting to the Real Endpoint of Endpoint Security
Endpoint device and access control for small to midsize businesses is itself becoming a big business, with vitually every major security vendor offering device and access control programs tailored -- and increasingly priced -- for the market.
Secure Computer Recycling II
The first step (admittedly paranoid but also, I think, practical) in recycling computers is to physically remove any storage devices. The second is to smash those devices to smithereens. The third step is to find the right place to drop off the now storage-less (and business data-less) remains of the computer.
What ISPs Are Scared Of
A new study of Internet service providers (ISP) and their top security concerns lets us know what they're most scared of: armies of zombie computers mounting huge distributed denial of service (DDoS) attacks.
Cybercrooks Outpacing Cybercops: McAfee
It's that time of year when the major security vendors release updates, upgrades... and public statements. McAfee's CEO this week pointed out that cybercrime is now bigger than the illegal drug trade -- and continues to grow.
Government Prodding Biometrics into the Mainstream?
Biometrics has been a market segment that seems to under perform consistently. To date, use of the technology has limited to select applications, such as securing laptops, but Uncle Sam may soon help to change that.
Cybercrime Gets More Organized
The increasingly organized -- and commoditized -- nature of cybercrime should make all of us more alert than ever to the risks our information, and our customers' information, face on our networks.
Don't Do As TD Ameritrade Does -- And Don't Do As They Say, Either
The security breach that let spammers get hold of as many as 6.3 million TD Ameritrade customer names, phone numbers and e-mail addresses is being spun as a "Well, they didn't get Social Security numbers, account numbers, PINs or other confidential info; still we apologize for any inconvenience or annoyance," sort of problem. Mistake. Big mistake.
QuickTime Patch Procrastination Poses Firefox Problems
Said it before, say it again: Bad enough to have flawed and vulnerable software out there, but probably unavoidable as code gets more and more complex. Completely unavoidable and equally inexcusable is letting a known vulnerability languish for any amount of time, much less a full year. Yet that's exactly what Apple's done with a QuickTime media player security hole that's been known of for at least that long.
Company Computers Not Safe At Home
A warning from Computer Associates that home computers are increasingly vulnerable and threatened -- surprise! -- set me to wondering how many of those computers aren't really home computers at all, but business computers used at home... and, more critically, used at home by people other than the authorized employee.
Do Not Ask Your Customers for Their Social Security Numbers
Do you want to make potential and existing customers feel secure? If so, one item that you need to avoid is asking them for their social security numbers. A poll by Consumer Reports National Research found that close to nine of every ten Americans want state and federal lawmakers to pass laws restricting the use of Social Security numbers. So if you want consumers coming back and ordering products
Skype Worm Bubbles Up
The latest worm wriggling from Skype (for Windows) user to Skype user by way of the network's chat function gives a good opportunity to remind employees not to click on unexpected messages or images on free VoIPware any more than they should anywhere else.
Botnet Storm Surge: Insecurity In Numbers
Whatever the summer heavy weather season has been like in your neck of the woods, the cyber-season saw the explosive growth of a monster security storm. After building strength all year, the Storm botnet worm has created a zombie grid so large that it could be a threat to... pretty much whatever the hackers who created it want it to be a threat to.
Bandwidth Is A Business Security Matter, Too
The more we can get, the more want to get -- nowhere truer than on the Internet, and getting truer by the day as rich video, audio, effects and extras become an expected part of the traffic. Not just entertainment traffic -- more and more small to midsized businesses are taking advantage of rich media and Web 2.0-ish techniques to send sophisticated sales, marketing and communications signals. But is their richness a business risk? It may be if your customers are Comcast customers.
Time to Guard Your Instant Messaging Traffic
One downside with popular IT technologies is they attract unsavory elements. Akonix Systems Inc. , a vendor specializing in instant messaging security products, reported that the number of instant messaging specific viruses doubled from July to August. The change could mean a shift in hacker priorities, so therefore small and medium enterprises need to take a closer look at protecting their IM traffic.
Counting The Cost Of Business Data Theft
Just how much does it cost to deal with a data theft or resolve a security breach? Insurance company Darwin Professional Underwriters has a free on-line calculator to help you find out.
Recycle Your Computers -- Not Your Business Info
The news that Sony's opening a number of electronics recycling centers across the country is good news for businesses that have stacks and scads of old, outdated, underpowered and otherwise unused computers and other electronic devices cluttering their closets and storage spaces. (It's even better news for landfills, which do not need the toxic materials the devices contain.) Just be sure that what you're putting into the system is the equipment, not your business data.