Protecting your data

From: http://www.theregister.co.uk/2013/10/17/indonesia_number_one_attack_source/?utm_source=twitterfeed&utm_medium=twitter "Indonesia has had the dubious honour of supplanting China as the number one source of attack traffic globally in the second quarter, according to the latest stats from content delivery and security firm Akamai. The vendor’s State of the Internet report for Q2 found Indonesia accounted for 38 per cent of the world’s…

Details

Your employees could be your number one security threat

From Article: http://www.tripwire.com/state-of-security/risk-based-security-for-executives/connecting-security-to-the-business/insider-threats-big-problem-shouldnt-surprise/ "I was just reading the results of a Forrester study called, “Understand the State of Data Security and Privacy.” One of the big findings was that “insiders” were the top source of breaches in the last 12 months, with 36% of breaches attributed to the (often inadvertent) misuse of data by employees.…

Details

Mobility and the future of tablets in the workforce

Dell is developing some nice tablets! http://www.techpageone.com/technology/infographic-empowering-mobile-workforce/#.Ulz7Y6Pn-Uk Is your organization set up to fully empower your mobile workforce? As tablets and other mobile devices continue to change the way people work, you need to make sure to keep up with your end users’ needs. If you haven’t given much thought to tablet adoption and desktop…

Details

HP Versus The World

Reposted from Tom's Hardware: http://www.tomshardware.com/news/hp-intel-microsoft-meg-whitman-android,24616.html Meg Whitman says, "HP's traditional highly profitable markets face significant disruption. Wintel devices are being challenged by ARM-based devices," she said. "The disruptive forces are very tough and very real, and they are accelerating. We are seeing profound changes in the competitive landscape. Our competitors are expanding across the IT…

Details

Trust People, Not Addresses

Don’t trust unsolicited files or embedded links, under any circumstances.   It’s easy to spoof e-mail addresses, so that an e-mail seems to come from someone other than the real sender (who may in any case be a spam tool rather than a human being). Basic SMTP does not validate the sender’s address in the…

Details

Good Password Practices

Use different passwords for your computer and online services. And it is good to segment your online service passwords, or keep them altogether different.  I have seen a number of systems for doing this; some bad, some mediocre, and some extremely sophisticated.  My favorite involves a root password that varies depending on the year, and…

Details

Do you need administrative privileges?

Use an account on your computer that doesn’t have administrative privileges to reduce the likelihood of installing malware; and to reduce the likelihood of making severe and catastrophic changes to your system.  Password protect the “administrator” account, and create a “limited” user account for daily use.   Most system administrators adhere to the principle of…

Details

Catch The Patch Batch

Keep your OS and applications up to date with automated updates and patches and by regularly reviewing the vendors’ product update sections on their websites. Sometimes it seems that the whole world assumes that the only vendor that suffers from vulnerabilities is Microsoft. To see how misleading claims like this can be, check out the…

Details