Wednesday, August 27, 2014
Bring Your Own Device (BYOD) in its many forms is fast becoming a fact of business life. Many decision makers and IT departments might not like it, but, regardless, they cannot afford to ignore it. Staff will bring their own devices into the enterprise, and they will throw data on the move into their preferred cloud store. Stopping it is difficult, nigh on impossible, but mitigating the risks involved isn't.
Monday, August 25, 2014
The average enterprise subscribes to the services of at least three cloud vendors, according to research by iland. Even allowing for departmental-level fragmentation being involved, this rather suggests that there must be good business reasons for having more than one cloud service provider. But, how do you strike the balance between not having enough cloud service providers at your disposal and having too many?
There's a truism that I like to share with as many people as possible: if you don't want other people to see something, then don't post it online. It is, you might think, a pretty simple concept to grasp. After all, you wouldn't stroll into a bar with a megaphone and yell "I'm not wearing underwear" if you wanted to keep that secret would you? But would you write that fact down on small pieces of paper and slip them unnoticed into the pockets of people in that bar if you wanted to reveal all (please excuse the unfortunate choice of phrase) without revealing your identity? In a nutshell, that's what apps such as Secret promise to do; but such a promise of anonymity is always going to be hard to deliver.
Monday, August 18, 2014
The statistics for cybercrime, online fraud and data theft make for disturbing reading. The Federation of Small Businesses (FSB) reckons the cost to each business is £4,000 per year, with around a third of FSB members falling victim to online crimes such as malware infections, hacking attacks or full-on data breaches. For the small- to medium-sized-business (SMB) owner especially, the impact of such attacks go beyond the immediate financial loss and disruption to the daily working schedule – there’s the loss of reputation and customer trust to factor in, too. Despite this, it’s SMBs that have the most difficulty finding affordable and doable security measures. This can lead to substandard protection or – worse still – no security at all. To help solve the problem, here are ten simple ways to make your business more secure.
Saturday, August 16, 2014
SuperValu has confirmed that is has, indeed, suffered a data breach. The supermarket company stated that what it calls a "criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores" may have resulted in "the theft of account numbers, and in some cases also the expiration date, other numerical information and/or the cardholder’s name, from payment cards used at some point of sale systems at some of the Company’s owned and franchised stores."
Monday, August 11, 2014
Thursday, August 07, 2014
An interesting post appeared yesterday in the official Google Online Security and Webmaster Central blogs which confirms that in an effort to "make the Internet safer" it has been testing a system which looks at "whether sites use secure, encrypted connections as a signal in our search ranking algorithms." This follows calls for HTTPS everywhere at the recent Google I/O a few months back. Google says is has seen positive results, and is now actually using HTTPS as a ranking signal albeit a "very lightweight" one which only impacts
A notice appeared on the Paddy Power corporate website at the end of last week, which confirmed details of a “historical data breach”. It boldly stated that no financial information or customer passwords were accessed during the breach, and a full investigation had revealed no adverse impact upon customer accounts. So that's cool then, right? Well not really, Paddy. The clue is in the use of the word 'historical' which could easily be replaced by hysterical were this actually not at all funny. You see, as IT Pro reported, the breach itself took place in 2010.
Wednesday, August 06, 2014
A report from Hold Security claims that one of the biggest ever online heists has been committed by a Russian crime gang. It would appear that the data theft includes, wait for it, no less than 1.2 billion (yes billion) username and passwords along with around half a billion email addresses obtained from more than 400,000 websites. In total, Hold Security says, the stolen data amounts to some 4.5 billion items.