How to Secure a Data Center

Posted by & filed under List Posts.

image of data center diversity and isolation for security

The nonprofit Identity Theft Resource Center keeps an ongoing record of incidents involving data compromise. The information is gathered from government agency releases and articles in the press. This effort started on January 1, 2005. Between that point and February 7, 2018, the organization has logged more than 8600 breaches, with a staggering 1.07 billion… Read more »

How to Secure Your Cloud Server

Posted by & filed under List Posts.

How to Secure Your Cloud Server

A few years ago, security was listed as one of the biggest reasons people might not want to entrust their data to the cloud. For good reason, companies have been careful and systematic in figuring out what information systems to use; security challenges on the Internet are by no means a new thing. Even back… Read more »

How to Secure E-Commerce

Posted by & filed under List Posts.

How to Secure E-Commerce

Digital attacks are, of course, of many different approaches and scopes; and the value of data that is stolen also is across a broad spectrum. While that case-by-case diversity exists, there is a commonality of being at risk across all businesses. Incredibly, a report last year revealed that half of small businesses in the United… Read more »

How to Secure WordPress

Posted by & filed under List Posts.

How to Secure WordPress

In February 2017, security researchers confirmed that as many as 20 hackers were injecting code into WordPress sites that had not yet updated to the newly released version of the platform, 4.7.2. The flaw within the REST API, fixed by the January 26 update, was making it possible for unauthorized users to change content of… Read more »

What is GDPR Compliance?

Posted by & filed under List Posts.

What is GDPR Compliance

Is your organization ready for the May 25, 2018, effective date of the General Data Protection Regulation (GDPR)? This short guide gives you a sense of what guidelines it contains, along with whose data it safeguards and who will have to follow the rules.   Understanding the GDPR   5, 4, 3, 2, 1… Second… Read more »

How the IT Threat Landscape Will Change in 2018 – Part 2 of 2

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018 – Part 2 of 2

<<< Go to Part 1   #6 – Competition with government for identity verification   One thing that should be learned from the compromise of Equifax, according to the Forrester report, is that individual organizations should not be put in the position of providing reliable verifications of identities and protecting the information of consumers –… Read more »

How the IT Threat Landscape Will Change in 2018

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018

In late 2016, Forrester forecast that automation and security services would be used increasingly to meet a shortage of tech talent, that greater than half a million IoT devices would be hacked, that compromises of healthcare systems would become as extensive and prevalent as previous ones within retail, and that a significant IT security breach… Read more »

Developing: Could IoT Botnet Mirai Survive Reboots?

Posted by & filed under List Posts.

Could IoT Botnet Mirai Survive Reboots

Mirai has been making a zombie army of swaths of the internet of things, so it is no wonder that manufacturers are taking steps to protect against it. However, one IoT device manufacturer’s failed attempt to protect its products against the botnet (used in massive DDoS attacks) shows how challenging this climate has become. When… Read more »

Krebs Correctly IDs Mirai Botnet Master Bestbuy

Posted by & filed under List Posts.

Mirai Botnet Master Bestbuy

  Anonymity. It is a characteristic that is often not viewed positively. We all want to be recognized for our accomplishments and actions, our most impressive or good-hearted deeds. However, sometimes, we would prefer to remain in the shadows – and that’s especially true for the criminals among us; after all, their identification could lead… Read more »

What is Hajime, and Why Should Mirai Care?

Posted by & filed under List Posts.

Hajime Versus Mirai

A malware strain called Mirai is created that amasses a botnet through exploitation of unsecured Internet of Things devices. As the number of zombie devices continues to build, the people behind the malware start to use it in distributed denial of service (DDoS) attacks. Eventually, Mirai really puts itself on the map by launching an… Read more »