network

Home/Tag: network

What’s the deal with LifeLock?

I often get questions from friends and family about LifeLock, an identity theft protection service - what it's all about, whether I use it (I don't), how effective the LifeLock services are, etc. Ironically, about a week and a half ago, LifeLock agreed to pay $100 million (see here) for allegedly breaching a FTC order by: "Failing to establish and maintain a comprehensive security program to protect its customers' sensitive personal information, including Credit Card, Social Security, and bank account [...]

A Reminder On The Danger Of An Inside Job

If you haven't heard this before, then get ready to hear it a lot more now. While outsider threats can be and are a big deal, and obviously a major concern, one of the biggest areas of risk for ANY company is and will be it's internal resources. Put another way, you have to be as careful about those who you give access to, as you are with those who don't have access to your network and corporate resources. Just [...]

New E-mail Extortion Campaigns Threatening DDoS Attacks

A warning to our clients and those concerned with the latest cybersecurity threats.  The FBI has issued an Extortion email PSA stating that there has been an exponential jump in the number of extortion threats sent via email to businesses of all sizes.  The threat involves the launching of DDoS attacks against a victim’s website unless or until a ransom is paid. This type of attack has been around for years, however they have recently grown in size, impact, and duration.  DDoS (Distributed [...]

Balancing Security And Customer Satisfaction

For those of us who perform any functions in cybersecurity, you know how much of a challenge it can be to strike a balance between needed levels of security and a happy customer base. The two are often at odds, considering that they are usually diametrically opposed. The CISO and his minions seek the utmost in security. Constantly changing passwords of a high complexity. Locked down VPN capabilities. Stringent standards for wireless networks. Strictly restricted device lists, in terms of [...]

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning world of IoT. Imagine if all of your numerous systems are becoming much more easy to network and thus control online-it would be a godsend [...]

Prevention Trumps Detection

Some of you may see that headline and consider me Captain Obvious, but it's worth saying regardless. For as many IT staffers out there prefer to take the approach of threat prevention and avoidance, there are still plenty  that are content to detect and remedy. And that method has a major flaw-detection time. While some security appliances do provide real time, or near-real time threat detection and reporting, deployment of such tools is not as common as, say, a wireless [...]

Healthcare Breaches Are Big Business

Many people have opined that this year could be the year of the healthcare hack, much like 2014 will be known for the Sony debacle. But these hacks are not about curious kids hacking around in their parent's basement. They have not been for a good while now. Though you will from time to time come across someone actually doing things for fun, the breaches are now, more than ever before, about finding holes, exploiting vulnerabilities and...cashing in. Hackers are [...]

Can A Good Defense Include…Offense?

When defending one's network resources, things like firewalls and other security appliances are envisioned. Putting walls up, both physical and virtual, to keep the bad guys out-that's the name of the game, right? What if it wasn't? People, and businesses, are hacked with regularity. Some hacks are harmless, some random person just probing things but without malicious intent. Others are testing and probing defenses, searching for a soft spot to exploit. And sometimes, you get the Sony hack that we've [...]

Denial Of Service…or Distraction?

It used to be that, when you heard someone was suffering from a DDoS attack, they were being bombarded with an amazing amount of traffic and sessions, effectively crashing the site for any legitimate traffic. Things tend to evolve over time. The same is apparently holding true for the denial of service attacks. As noted in a recent study, new DDoS attacks are trending towards shorter spans of time, tying up less than the typical amount of bandwidth (http://www.fierceitsecurity.com/story/companies-are-being-koed-after-ddos-jabs/2015-03-24). In [...]

Remember To Cover The Basics

It may seem obvious. It may be old hat. But it’s always worth repeating. Especially in light of a recent Cisco study that reveals that many IT teams fail to take even basic security steps. And what are those most basic of steps? Things like taking the time to apply critical patches when released, or maintaining up-to-date code levels. By being lax in these extremely obvious and supposedly routine procedures, an organization can be left open to major vulnerabilities for [...]