When most people think of data center disasters, they probably think of security breaches that major companies have suffered in recent years. While these incidents are significant and can have serious implications, they are not the only disasters to strike in the history of data centers. (missionmode.com) 1983: Faulty Early Warning System Almost Triggers World War III It sounds like …
Cyber Spy Say: There’s Bad News and Bad News
You’re already infected. They’re already inside. It’s not “game over” time, but you need to do something about it because it’s just going to get worse. But hey, cheer up: you’re no different than anyone else. Article by Amir Mizroch in WSJ Digits. Emphasis in red added by me. Brian Wood, VP Marketing —— Ex-Cyber Spy’s Message to Board Members: …
How Many Financial Services Firms Had Cyber Attacks?
These two sentences encapsulate the impact of the article below: “Look for data privacy and data protection to soon become the first differentiator in consumer and business buying decisions.” “The fastest way to lose customers is to lose your grip on their data.” Read and heed. Summary article by Pam Baker in FierceBigData; original report by Kaspersky. Emphasis in red …
Never Not Protect Your VMs
As with Apple computers and iPhones, it used to be that virtual machines (VMs) got a “free pass” when it came to malware: the bad guys just didn’t bother with them. No more — especially as businesses move rapidly to VMs because of the inherent advantages pertaining to backups, version control, efficiency, and so on. Never assume your instance is …
Cloud Safety Basics for Healthcare Companies
It’s no longer possible for organizations to stick their heads in the sand when it comes to cloud services — and this includes healthcare organizations. Like it or not — and planned or not — employees are transferring corporate information to external repositories which may or may not be safe, secure, approved, backed up, stable, available, or monitored. Below are some …
Busting Five DDoS Myths
Good information and motherhood on DDoS below. Bottom line: it can happen to you. Yes — it can. Yes — you. Article by Jag Bains in Help Net Security. Emphasis in red added by me. Brian Wood, VP Marketing ——– Dispelling the myths behind DDoS attacks Distributed Denial of Service (DDoS) attacks are quickly becoming the preferred method for cyber …
The USB Is Bad Juju
File this article in the category of “don’t take candy from strangers” — but take it a few steps further. Basically this in the category of “if you didn’t make the candy yourself from ingredients that you know to be trustworthy, and if you haven’t had the candy in your possession at all times since then, don’t eat it.” Stick …
CyberFest, Oct 1 in San Diego
October 1, 2014 | Stone Brewery World Bistro & Gardens Liberty Station 2816 Historic Decatur Rd #116 San Diego, CA 92106 7:00 AM to 7:00 PM There is no limit to what can be connected to the Internet. According to Pew Research Center’s Internet and American Life Project, researchers predict that roadways, buildings, bridges, dams, paper towel dispensers, trash cans, alarm …
The Top 5 Most Infamous Hackers
For as long as the internet has been around, there have been hackers, crackers, sneakers, and cyber-terrorists. However you prefer to call them, they’re thieves and they prey upon not only unsuspecting victims, but large, seemingly secure corporations (think Target), and even the government as well. The world of hacking doesn’t discriminate, however, and the most successful hackers gained notoriety …
Infographic: BYOD Security Boo Boos
Everyone loves an infographic. Especially when the infographic includes a guy with a bow tie and cigar. Posted by Fred Donovan in FierceITSecurity; original infographic posted at bitglass. Emphasis in red added by me. Brian Wood, VP Marketing —— Infographic: Employees admit to flaunting policies prohibiting BYOD Two-thirds of employees who have personal smartphones admit to accessing corporate data from those …