8 Tips to Secure Those IoT Devices

By Michelle Drolet . 20 Jun 2016

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace   As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush … Continue reading 8 Tips to Secure Those IoT Devices

5 InfoSec concerns for colleges and universities

By Michelle Drolet . 14 Jun 2016

Higher education institutions are a prime target for cybercriminals, and IT needs resources to prevent attacks and provide a proper level of security   No industry or sector is immune to data breaches, but some are targeted more often than others. Education came ahead of government, retail and financial sectors, and it was second only … Continue reading 5 InfoSec concerns for colleges and universities

3 Ways to Protect Data and Control Access to It

By Michelle Drolet . 23 May 2016

Your company’s data is its crown jewels, and you must protect it all times. CIS Controls 13, 14 and 15 will help you.   Earlier we delved into disaster recovery and network security. Now it’s time to take a look at Critical Security Controls 13, 14 and 15, which cover data protection and access control. The … Continue reading 3 Ways to Protect Data and Control Access to It

7 Potential Security Concerns for Wearables

By Michelle Drolet . 28 Apr 2016

Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise … Continue reading 7 Potential Security Concerns for Wearables

Bugs for cash: Bounty hunters in the new wild west of security

By Michelle Drolet . 20 Apr 2016

How security researchers and programmers hunt software bugs for cash rewards   The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly … Continue reading Bugs for cash: Bounty hunters in the new wild west of security

DROWN attack sinks security for millions of websites

By Michelle Drolet . 8 Mar 2016

Security researchers reveal new technique to break TLS using SSLv2 server. The war to close down security vulnerabilities is never-ending, but the new “DROWN” vulnerability is one of the biggest to rear its ugly head in recent months. A group of security researchers from a number of different universities and research institutes just unveiled this … Continue reading DROWN attack sinks security for millions of websites

Ransomware is only getting worse. How do you prepare for it?

By Michelle Drolet . 4 Feb 2016

Ransomware-as-a-service, help desks, third parties — all point to a mature yet illegal enterprise undergoing serious growth. Here are tips to protect yourself and your company.   Ransomware is big business. Over the last few years we’ve observed the steady rise of ransomware, with some trepidation. It is fast becoming a multi-billion dollar business, and … Continue reading Ransomware is only getting worse. How do you prepare for it?

5 Information Security Trends for 2016

By Michelle Drolet . 20 Jan 2016

Online security trends continue to evolve. This year, online extortion will become more prevalent. We also expect that at least one consumer-grade IoT smart device failure will be lethal.  Ransomware will make further inroads, since the majority go unreported. China will drive mobile malware growth to 20M, and cybercrime legislation will take a significant step … Continue reading 5 Information Security Trends for 2016

10 Things I Know About Business Security

By Michelle Drolet . 19 Jan 2016

10. Everything is connected. As the Internet of Things adds more and more devices to our networks, it creates more doors and windows for cyber criminals. Keep them locked. 9. Ransomware is on the rise. If you don’t want to end up paying to access your own data, then make sure that you protect it … Continue reading 10 Things I Know About Business Security

Cyberattack     Hacking    

The Worst Hacks of 2015

By Michelle Drolet . 5 Jan 2016

Hacking and data breaches weren’t just the norm, but they reached far and wide, hitting victims of all kinds, from regular consumers, to government employees, and even children and cheaters. It seemed like no one was spared. The Worst Hacks of 2015…drum roll please! Israel Government Allegedly Hacks Kaspersky Lab The Massive Breach at OPM, … Continue reading The Worst Hacks of 2015

Tags