How DDoS Attacks Have Evolved

Posted by & filed under List Posts.

DDoS history -- distributed denial of service attacks

With the rise of the Internet of Things (IoT), experts have warned that it is incredibly vulnerable from a security perspective – and it has been exploited by DDoS attackers. In September-October 2016, nearly 50,000 connected devices, spread out across 164 nations, were used to achieve traffic as high as 280 Gbps. The attack sent… Read more »

What are the Ethics of Ecommerce?

Posted by & filed under List Posts.

Ecommerce ethics attempt to describe fair and just behavior by online merchants. (Yellow ethics sign)

A Tesla investor sued Elon Musk in early August, saying that they believed his claim on Twitter that he had funding solidified to turn the publicly traded company private was fraudulent. This story is still in development and certainly Musk has not (at least at this point) been found guilty of any wrongdoing. The investor,… Read more »

The ROI of Information Security

Posted by & filed under List Posts.

ROSI - the return on security investment. Fingerprint on keyboard - assessment of solutions

People often talk about security in terms of defenses and caution – an emergency system to prevent worse-case scenarios. However, thinking in terms of defense and prevention can distract us from a fundamental truth: security is powerful. It has an incredible amount of value to organizations across all sectors and markets. Establishing the ROI of… Read more »

Why Security is a Top Priority for Ecommerce

Posted by & filed under List Posts.

With growth of malware and ransomware, security is a top priority.

It is easy to develop blind spots in our thinking, particularly toward things that we see often, as if they become invisible to us after so much repetition. For instance, we may read so much about cyberattacks and how important security is that it may make it more difficult to logically consider the topic and… Read more »

What the GDPR Means for Global Business

Posted by & filed under List Posts.

data eminating outward from the individual, the key concern of the General Data Protection Regulation from the European Union

Bolstered consumer consent. The “right to be forgotten.” 72-hour breach reporting. Hefty fine schedules. These aspects of the General Data Protection Regulation from the European Union are now in effect, as of May 25, 2018. As the most significant change to data security law in Europe in two decades, this new set of rules is… Read more »

What is GDPR Compliance?

Posted by & filed under List Posts.

What is GDPR Compliance

Is your organization ready for the May 25, 2018, effective date of the General Data Protection Regulation (GDPR)? This short guide gives you a sense of what guidelines it contains, along with whose data it safeguards and who will have to follow the rules.   Understanding the GDPR   5, 4, 3, 2, 1… Second… Read more »

How the IT Threat Landscape Will Change in 2018 – Part 2 of 2

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018 – Part 2 of 2

<<< Go to Part 1   #6 – Competition with government for identity verification   One thing that should be learned from the compromise of Equifax, according to the Forrester report, is that individual organizations should not be put in the position of providing reliable verifications of identities and protecting the information of consumers –… Read more »