Beware Ye, AWS Buyer

Brian Wood Blog

Buyer beware: if it sounds to good to be true, it probably is. You never get more than what you pay for — and sometimes you don’t even get what you pay for. There’s usually a reason why something is cheap. By Beth Pariseau in SearchCloudComputing. Emphasis in red added by me. Brian Wood, VP Marketing ———– AWS fends off …

FUD: Good for IT Budgets, Bad for CyberSecurity

Brian Wood Blog

Why bother battening the hatches and remaining resilient when… THE BAD GUYS ARE COMING TO GET US !?!? Tried-and-trusted risk management approaches are just way too passe when…DANGER LURKS IN EVERY LINK! Article by Warwick Ashford in ComputerWeekly. Emphasis in red added by me. Brian Wood, VP Marketing ——— Fear of cyber attack driving a shift from risk-based security, says …

Man Bites Dog — and Bytes Dog Man

Brian Wood Blog

And you thought having enough storage was going to be the main problem? It turns out that having enough words to describe the massive amount of stuff being stored is actually a big problem too. I like hellabytes and whateverbytes — but I also like dogbytes, babybytes, mosquitobytes, and soundbytes. Yeah, yeah, I’ll stick to the day job, I know. …

With LG, “Watching TV” Takes on Whole New Meaning

Brian Wood Blog

PRISM schmizm. The NSA’s got nothin’ on LG. Article by Pam Baker in FierceBigData Emphasis in red added by me. Brian Wood, VP Marketing ——— LG caught red-handed spying on viewers via Smart TVs Jason Huntley, U.K. ICT consultant, accidently discovered his LG Smart TV was sending extensive information about his viewing habits to the Korean manufacturer. He gives a …

Seriously? Top 50 Popular Passwords

Brian Wood Blog

Call me crass, but what I really want to know is whether “schadenfreude” is a strong password. Wait for it…1…2…3…4…5…6…Yah? Article by Graham Cluley on his website. Emphasis in red added by me. Brian Wood, VP Marketing ——— The top 50 woeful passwords exposed by the Adobe security breach In early October, Adobe revealed that hackers had breached its network …

How to Know If You’ve Been Hacked

Brian Wood Blog

Want to stay healthy? Don’t take candy from strangers, and don’t drink from other peoples’ cups, and wash your hands frequently. Want to stay cyber healthy? Don’t click on links from unknown senders, don’t turn off your malware detection software, and scan your system often. Article by Roger A. Grimes in InfoWorld. Emphasis in red added by me. Brian Wood, …

How to Not Be an Idiot

Brian Wood Blog

Read and heed. Article by Saroj Datoo in Quartz. Emphasis in red added by me. Brian Wood, VP Marketing ——— The complete guide to not being that idiot who got the company hacked Every week there are headlines about a company getting its email, website, Twitter accounts or something else hacked. The reason? In a word: Employees. Each of your …

The Nut Behind the Wheel

Brian Wood Blog

Looking for quick ROI on cyber security? Start with training your people. Great article by Jessica Barker in Econsultancy. Emphasis in red added by me. Brian Wood, VP Marketing ———- Don’t be fooled by the name: cyber security is about people, not technology When you hear the phrase ‘cyber security’, what springs to mind? On the face of it, cyber …

What It’s Like to Be Hacked

Brian Wood Blog

Below is a great read about what it’s like to be hacked (by invitation, with full details of how the “bad” guys did it). Article by Adam Penenberg, the editor of PandoDaily — with cool illustrations by Alex Schubert. Emphasis in red added by me. Brian Wood, VP Marketing ———- I challenged hackers to investigate me and what they found …

Buyer (and Gamer) Beware

Brian Wood Blog

By now we all know the drill: Zombie “sleeper cells” are programmed to wake up and attack on a designated date — with their hosts none the wiser. Similarly, it turns out that seemingly innocuous (and free) computer games from our friends in North Korea are merely shells for the evil malware that lurks within. Far-fetched? Nah. Fact-checked. Article by …