Establishing Security Goals

By Michelle Drolet . 8 Jan 2014

Implementing security practices in your organization’s employees’ daily work habits, and ensuring the integrity and confidentiality of information security, the goals of the Security Awareness Program are: Put information security and its importance into the forefront of your staff’s minds. Spread information security policy and awareness throughout corporate ranks. Build security awareness into the technical … Continue reading Establishing Security Goals

10 Things I Know About … Passwords

By Michelle Drolet . 6 Jan 2014

10. Be clever Create passwords from easy-to-remember sentences, such as < Patriots Win the Super Bowl>, using the first letter of each word and adding numbers and special characters at the beginning or end. (e.g., <12=PwtSB!>) 9. Create a management system Consider creating one, very strong password and appending it with identifiers, such as <!Kr0y-W3n$TOM> … Continue reading 10 Things I Know About … Passwords

3 Keys To Keep Enterprise Clouds Secure

By Michelle Drolet . 11 Dec 2013

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten to expose your company to unnecessary risk. There’s a lack of planning and due diligence when choosing cloud providers, and there’s … Continue reading 3 Keys To Keep Enterprise Clouds Secure

Towerwall Information Security Alert Vol 13.50 – Making phishing more complex – on purpose

By Michelle Drolet . 25 Oct 2013

Earlier this week a colleague pointed out an intriguing phishing sample that he had come across. It was interesting not because of any great sophistication or complexity, but rather that it illustrated the reuse of an old social engineering trick. The brand being targeted in the phish campaign is Poste Italiane, a well-known Italian group … Continue reading Towerwall Information Security Alert Vol 13.50 – Making phishing more complex – on purpose

10 Things I Know About… Mobile Security

By Michelle Drolet . 5 Aug 2013

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways. 9. BYOD Is A Challenge There are obvious benefits to the BYOD (Bring Your Own Device) trend, but it also creates IT challenges and exposes your company to new … Continue reading 10 Things I Know About… Mobile Security

Read the EDA’s Report on Malware Infections

By Michelle Drolet . 29 Jul 2013

Read the EDA’s Report on Malware Infections – Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

First malicious apps to exploit critical Android bug found in the wild

By Michelle Drolet . 29 Jul 2013

Researchers have spotted the first in-the-wild apps to exploit a critical Android vulnerability allowing attackers to inject malicious code into legitimate programs without invalidating their digital signature. The two apps, distributed on unofficial Android marketplaces in China, help people find doctors and make appointments, according to a blog post published Tuesday by researchers from security … Continue reading First malicious apps to exploit critical Android bug found in the wild

Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

New LinkedIn E-Mail Scam

By Michelle Drolet . 3 Jul 2013

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even … Continue reading New LinkedIn E-Mail Scam

Facebook leaks are a lot leakier than Facebook is letting on

By Michelle Drolet . 28 Jun 2013

Remember last week, Facebook leaked email addresses and phone numbers for 6 million users, but that it was really kind of a modest leak, given that it’s a billion-user service? OK, scratch the “modest” part. The researchers who originally found out that Facebook is actually creating secret dossiers for users are now saying the numbers … Continue reading Facebook leaks are a lot leakier than Facebook is letting on

Tags