Automating Banking Fraud: How It Works

By | April 22nd, 2013
Industry InSights, Network Security & Solutions|Comments Off on Automating Banking Fraud: How It Works

Holiday Shopping Security Tips

By | December 6th, 2011
Industry InSights, Network Security & Solutions|Comments Off on Holiday Shopping Security Tips

Ten Tips to Stay Safe on Cyber Monday

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. For employees who spend time making purchases either at lunch, break time, or at the end of the work day, here are some tips to stay safe on the largest online activity day of the year. [1] Make sure your desktop computer, laptop, smartphone, or mobile [...]

By | November 22nd, 2011
Industry InSights, Network Security & Solutions, Security Awareness|Comments Off on Ten Tips to Stay Safe on Cyber Monday

How Hackers Target Your Twitter Account

Can you guess how many of the top 10 Twitter users have been hacked? Or what the most common password was before Twitter had to ban it for security reasons? There’s a lot to learn from this infographic from MediaBistro, especially if you’re good at learning from others’ mistakes

By | September 27th, 2011
Industry InSights|Comments Off on How Hackers Target Your Twitter Account

Largest Data Breaches of All Time

As Sony deals with their most recent data breach of one million passwords, Flowing Data took a look at the the largest data loss incidents on record, according to DataLossDB.        

By | June 14th, 2011
IT Infrastructure|Comments Off on Largest Data Breaches of All Time

How Does Your Security Strategy Rate?

Much to the chagrin of IT professionals who face the constant onslaught of threats and problems, security tests can never prove that you are secure. That’s because security is a process, not a final destination. As such, security testing should be applied with a well thought-out strategy...

By | March 31st, 2009
Compliance & Business Continuity, Network Security & Solutions|Comments Off on How Does Your Security Strategy Rate?

Don’t Let Development Pressures Cut Security Testing Short

There are more than 5,000 known security vulnerabilities and the number is growing. In 2008, there were 11.5% more internet security vulnerabilities disclosed than in 2007. That’s because we’re getting better at identifying and eliminating vulnerabilities. But all the progress made can be thrown out the window, if you’re in a hurry to roll out the latest and greatest software upgrade. Don’t cut security testing short just to meet deadlines...

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on Don’t Let Development Pressures Cut Security Testing Short