Mobile Phishing

Mobile Phishing By: Pierluigi Paganini Emails are considerable as a primary vector for cyber-attacks against mobile devices, principal security firms revealed that phishing activities in the last few years have increased exponentially, targeting every sector from industry to government agencies. RSA’s October Online Fraud Report 2012 described an impressive increase in phishing attacks, up 19% over the second half of 2011. The total loss for various organizations sums up to $2.1 billion over the last 18 months; [...]

By | April 2nd, 2013
Network Security & Solutions|Comments Off on Mobile Phishing

Embracing Social Media in the Workplace: Risk or Reward?

Social networking is more than just websites like Facebook, Twitter and Google+ -- it’s also the devices and users that access these sites. Today’s digitally-aware generation of employees are bringing their smart phones and tablets right into the workplace. Not because this digitally-native generation prefers texting to phone calls, and status updates over emails. Mobile technology is not a convenience for them - it’s how they live, and increasingly, how they work. Some organizations view [...]

By | October 25th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Embracing Social Media in the Workplace: Risk or Reward?

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise

Gartner Research Presents: 16 Criterion for Evaluating the Right Data Backup

Selection Criteria for Database Archiving Products Database archiving is gaining traction as a technology that can significantly improve application performance and reduce storage costs. It is also being used as part of application decommissioning projects to preserve and enable access to associated older data. Key Findings Database archiving products can offer good infrastructure cost reduction when implemented to manage application data growth. Database archiving products can be used to transparently access aging data by offering [...]

By | August 19th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Gartner Research Presents: 16 Criterion for Evaluating the Right Data Backup

Do you know which threats your Anti-Virus won’t stop?

News headlines have been a constant reminder every day that data leakage and malware attacks are on the rise, and increasing at high speeds.  Many believe these malicious attacks are targeted towards large corporations with big bucks, but businesses of all size and functions are facing these risks every day.  Your basic anti-virus solution alone won’t stop these attacks; you need to take extra provisions when protecting your organization. To help you mitigate the risks, [...]

By | April 21st, 2011
Industry InSights, IT Infrastructure|Comments Off on Do you know which threats your Anti-Virus won’t stop?

Managed Firewall 101: What Everyone Needs to Know

If your home has ever been burglarized, you know what it feels like to be victimized. You may have been temporarily aggravated or even angered by the “inconveniences” that followed the event, i.e., repairing a broken window or door, changing the locks, installing an alarm system, replacing items that were stolen, wondering what else was stolen that you haven’t noticed yet, etc., and somehow, the feeling of just how vulnerable you are stayed with you [...]

By | March 22nd, 2011
IT Infrastructure|Comments Off on Managed Firewall 101: What Everyone Needs to Know

Data Loss Prevention: Should You Trust Your Employees?

Stolen identities, bank accounts and credit card numbers are sold in bulk every day in shadowy online forums, often for pennies on the dollar. Cyber criminals can easily make a few hundred to a few thousand bucks a day from selling this stuff. Data can be breached in many ways including intercepting it as it travels across the network, stealing data that is stored in file shares, databases and endpoints, and spying on data that’s [...]

By | March 22nd, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on Data Loss Prevention: Should You Trust Your Employees?