IT

Home/Tag: IT

The Trend from 2019 You Didn’t Expect

Biggest trend in 2019 - Executives let their IT departments determine the risk level of the entire company. What actually happened in 2019? Increase in Ransomware Increase in Business Email Compromise Increase in compliance driven by clients Increase in compliance driven by EU and (incoming… California) What should you be doing in 2020? Avoiding phishing and social engineering attempts Using a password manager AND not repeating your passwords Use multi-factor and advanced biometrics when available Shocked by any of this? [...]

Today’s SDLC and Cybersecurity – Coding, SMEs, and Spaghetti

One of our friends in the insurance world sent us an email with an interesting article about the nature of "secure programming" (see here for the article) and how it has influenced some of the information security challenges the market is facing. I initially shared my insights (below) to the email, but I figured it was worth posting. Enjoy! -- -- Over 30 years ago, one of my personal heroes (Ken Thompson, coder-extraordinaire and inventor of the B and Go programming languages) said something [...]

You Are Only As Secure As Your Weakest Link

And, would you care to guess who your weakest link is, in terms of maintaining good security? According to a recent study, those folks most often tasked with keeping things secure for the enterprise, are also actually the ones most likely to cut corners themselves. When I saw that, I initially wanted to be stubborn and deny it was possible. But after a quick thought, I realized it was more than likely spot on. Think about it. When the company [...]

2015-12-23T17:31:42-05:00By |Tags: , , , , , , , , , |

The Developing Cybersecurity Marketplace

The Economist recently published an article, "Cyber-security: The cost of immaturity" in their November 7th edition. In the article, the authors discuss how the "business of protecting against computer hacking is booming." To quote part of their article, "A report by Bank of America Merrill Lynch reckons the market is $75 billion a year now and will be $170 billion by 2020. Not only is demand soaring, but barriers to entry are low. Anyone able to spout out a bit [...]

IT and Security: One Team or Two?

Stop me if you've heard this request before..."we need project X delivered, as soon as possible."  To the requester, there is no corner not worth cutting. Whether they know it or not, they have a disregard for the processes that are usually in place to make sure things are done by the book. Put plainly, in an IT department, speed has a troubling tendency to trump security or general processes, most especially when the security arm for your firm is [...]

The Non-Giggle-Factor about the Ashley Madison Breach

  There is a giggle factor to the thought that 37 million people who proactively search out affairs could be exposed. However… once the giggle factor is gone, the truth is that this company was about to go public. Regardless of the direction your moral compass points, the sad fact is that a lot of people are about to lose a lot of money, sweat equity and potential wealth because they didn’t protect their platform and their company with proactive [...]

Securing Your Mobile Device

Simple enough thought, right? Every day before I leave my house or my desk, I make sure my cell phone is with me. I don’t want to risk physically being away from it, because it is an important tool in my day-to-day business life. As a condition of having my cell phone, I am asked to use mobile device management (MDM) software on it. One reason is that the software allows the IT staff responsible for supporting mobile users to [...]

2017-06-22T20:19:43-04:00By |Tags: , , , , , , , |