Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Are Your Smartphone Apps Leaking Personal Information? For many years now, we have been trained to look for the SSL icon on our browsers, and have told our family and friends to do the same. It’s a basic security measure that ensures our traffic cannot be intercepted and spied on. The last thing we want when doing online banking, reading our email or shopping online is having someone sitting there and watching our every move, [...]

By | March 13th, 2013
Industry InSights, IT Infrastructure|Comments Off on Are Your Smartphone Apps Leaking Personal Information In Clear Text?

How Hackers Target Your Twitter Account

Can you guess how many of the top 10 Twitter users have been hacked? Or what the most common password was before Twitter had to ban it for security reasons? There’s a lot to learn from this infographic from MediaBistro, especially if you’re good at learning from others’ mistakes

By | September 27th, 2011
Industry InSights|Comments Off on How Hackers Target Your Twitter Account

Gartner Research Presents: 16 Criterion for Evaluating the Right Data Backup

Selection Criteria for Database Archiving Products Database archiving is gaining traction as a technology that can significantly improve application performance and reduce storage costs. It is also being used as part of application decommissioning projects to preserve and enable access to associated older data. Key Findings Database archiving products can offer good infrastructure cost reduction when implemented to manage application data growth. Database archiving products can be used to transparently access aging data by offering [...]

By | August 19th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Gartner Research Presents: 16 Criterion for Evaluating the Right Data Backup

Largest Data Breaches of All Time

As Sony deals with their most recent data breach of one million passwords, Flowing Data took a look at the the largest data loss incidents on record, according to DataLossDB.        

By | June 14th, 2011
IT Infrastructure|Comments Off on Largest Data Breaches of All Time

What Are the Odds of a Security Breach at Your Institution?

If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...

By | March 31st, 2009
Network Security & Solutions|Comments Off on What Are the Odds of a Security Breach at Your Institution?

What Are the Top Security Threats for 2009?

Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on What Are the Top Security Threats for 2009?