How DDoS Attacks Have Evolved

Posted by & filed under List Posts.

DDoS history -- distributed denial of service attacks

With the rise of the Internet of Things (IoT), experts have warned that it is incredibly vulnerable from a security perspective – and it has been exploited by DDoS attackers. In September-October 2016, nearly 50,000 connected devices, spread out across 164 nations, were used to achieve traffic as high as 280 Gbps. The attack sent… Read more »

What are the Ethics of Ecommerce?

Posted by & filed under List Posts.

Ecommerce ethics attempt to describe fair and just behavior by online merchants. (Yellow ethics sign)

A Tesla investor sued Elon Musk in early August, saying that they believed his claim on Twitter that he had funding solidified to turn the publicly traded company private was fraudulent. This story is still in development and certainly Musk has not (at least at this point) been found guilty of any wrongdoing. The investor,… Read more »

The ROI of Information Security

Posted by & filed under List Posts.

ROSI - the return on security investment. Fingerprint on keyboard - assessment of solutions

People often talk about security in terms of defenses and caution – an emergency system to prevent worse-case scenarios. However, thinking in terms of defense and prevention can distract us from a fundamental truth: security is powerful. It has an incredible amount of value to organizations across all sectors and markets. Establishing the ROI of… Read more »

WordPress Security Best Practices for 2018

Posted by & filed under List Posts.

Lock against code - WordPress security steps to take in 2018

Statistics garnered from analysis of tens of thousands of WordPress sites within the Alexa top 1 million suggest why hackers often choose WordPress to attack. Incredibly, the study from WP WhiteSecurity found that 70% of installations are vulnerable to hacking. The researchers looked at the WordPress installation status and behavior of these WordPress sites in… Read more »

Why Security is a Top Priority for Ecommerce

Posted by & filed under List Posts.

With growth of malware and ransomware, security is a top priority.

It is easy to develop blind spots in our thinking, particularly toward things that we see often, as if they become invisible to us after so much repetition. For instance, we may read so much about cyberattacks and how important security is that it may make it more difficult to logically consider the topic and… Read more »

7 Steps to a HIPAA-Compliant Risk Analysis

Posted by & filed under List Posts.

HIPAA risk analysis - steps to achieve - doctor on laptop

As you consider your risk analysis and efforts to keep it HIPAA-compliant, it is helpful to understand that the notion of risk is inherently context-based. Whenever you think about risk, initial questions to ask yourself are: What asset am I attempting to protect? What are potential threats? What must be defended? How substantial is the… Read more »

What the GDPR Means for Global Business

Posted by & filed under List Posts.

data eminating outward from the individual, the key concern of the General Data Protection Regulation from the European Union

Bolstered consumer consent. The “right to be forgotten.” 72-hour breach reporting. Hefty fine schedules. These aspects of the General Data Protection Regulation from the European Union are now in effect, as of May 25, 2018. As the most significant change to data security law in Europe in two decades, this new set of rules is… Read more »

GDPR Has Launched – 7 Steps to Compliance

Posted by & filed under List Posts.

Juggling security to protect sensitive customer data - GDPR compliance steps - General Data Protection Regulation

While there are borders between nations, the world is integrally connected. That is perhaps nowhere more evident than in the marketplace of the Internet. The interconnection that the Web allows also means that security is a huge priority, since no one wants anyone who is unauthorized accessing their confidential data. Sometimes legislation will be passed… Read more »

How to Secure a Data Center

Posted by & filed under List Posts.

image of data center diversity and isolation for security

The nonprofit Identity Theft Resource Center keeps an ongoing record of incidents involving data compromise. The information is gathered from government agency releases and articles in the press. This effort started on January 1, 2005. Between that point and February 7, 2018, the organization has logged more than 8600 breaches, with a staggering 1.07 billion… Read more »

How to Secure Your Cloud Server

Posted by & filed under List Posts.

How to Secure Your Cloud Server

A few years ago, security was listed as one of the biggest reasons people might not want to entrust their data to the cloud. For good reason, companies have been careful and systematic in figuring out what information systems to use; security challenges on the Internet are by no means a new thing. Even back… Read more »