Home

Corporate Security: Are Your Employees Taking Proper Precautions?

With the announcements earlier this month by Home Depot and J.P. Morgan Chase that their systems’ security had been compromised, companies everywhere should be taking a closer look at their own corporate defenses. Although J.P. Morgan Chase is remaining close-lipped about the breach, Home Depot has confirmed […]

Read more

Half of all American adults were hacked in a recent 12-month period

As part of story on the recent UPS Stores data breach, a CNNMoney analysis was cited that  found that half of all American adults were hacked in a recent 12-month period. http://money.cnn.com/2014/08/21/technology/security/ups-store-data-hack/index.html?hpt=hp_t2

Read more

Is Your Data Safe?

In recent weeks, the news has been filled with stories of high profile data breaches, including the theft from the European Central Bank of some 20,000 email addresses. Behind the sensational headlines is a more important story for both corporations and government entities―everyone is a target and […]

Read more

First Vulnerability to Expose Windows XP Risk

At Issue On April 26th Microsoft issued a security advisory concerning all versions of Internet Explorer. https://technet.microsoft.com/en-us/library/security/2963983 This vulnerability could allow an attacker to execute arbitrary code on a victim’s computer. The vulnerability effects all versions of Internet Explorer from version 6 through version 11. This is […]

Read more

Heartbleed Vulnerability Information

On Monday April 7, 2014, a security vulnerability known as “Heartbleed” was publicly disclosed. This vulnerability allows malicious persons to access information which was transmitted between computers using a specific implementation of Secure Sockets Layer (SSL) communication. SSL is primarily used to secure communications between computers and […]

Read more

IT Security is Everyone’s Job

In a recent talk that I gave to a group of accountants for various city governments I asked how many of the attendees were in IT security.  As you might expect, no one raised their hands, that’s the IT department’s job.  But are they the ONLY people […]

Read more

Facing the New Security Challenge BYOA

The Bring Your Own Device (BYOD) craze and its rising security concerns has been the topic of every major security conference. The need for secure mobile computing has pressed many organizations to adjust policies and controls in order to keep pace with the devices that enter the […]

Read more