Tag Archives: Malware

5 Reasons Behind Data Breaches and Cybercrime

JP Morgan, Home Depot,Target, Kaiser Health,Adobe All Big Data Breaches

My day job is a partner of GFI Software, Each day I speak to IT admins form very small to very large companies in North America, My focus is on Patch Management, Network Vulnerability Scanning,Windows Event Log Management, Securing network endpoints, W3C log management, as well as web security and email security.
Continue reading

12 email tips to share with your users

Unsolicited email or spam may be a mere nuisance for most anti-spam-300x300emails users, but for an IT administrator spam is a headache and a major security threat. More than 3% of all spam includes a malware payload, but that doesn’t mean that the remainder is safe. Far from it. You can still be directed to a website that is infected by clicking on a link in that email.
Continue reading

10 BYOD policy guidelines for a secure work environment

Bring your own device (BYOD) is no longer simply a buzzword BYOD-300x256or a new trend; it’s reality. And in that reality, almost half of all employees use their own devices to access corporate assets such as network drives, documents, printers, web proxies, social media sites, and personal cloud services. Malware, viruses, theft, unsecured devices, jailbroken devices, and a lack of control put corporate data, intellectual property, and client information at risk. The answer to this problem is to create, to manage, and to enforce BYOD policy guidelines to secure your work environment.
Continue reading

A tale of two security approaches – and why you need both

Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting down a system or an entire network, destroying data and/or programs, or collect information and send it back to the attackers.
Continue reading

10 must-know email security tips

By: Doug Barney

Email is by far the number one way networks are compromised and the main route for data leakage. Fortunately there are some simple ways to safeguard this vital asset and the resources your email connects to.

1. Proper passwords

Too many email accounts are protected by passwords weaker than a Tour de France racer’s bicep. Simple passwords are simple to remember – so left to their own devices, that is what end users tend to choose.
Continue reading

BYOD: 16 Rules to Avoid “Bring Your Own Disaster” [Infographic]

Written by: Christina Goggi

Productivity is what you want in your business; and productivity increases when your employees are happy in their  jobs. Giving them space and a level of freedom to use their own devices on the company network is one approach that shows trust– and that makes them happy. At the same time, you do not want that ‘freedom’ to negatively impact the hard work that went into standardizing and protecting your system.
Continue reading

CryptoLocker: Ransomware Back with Vengeance?

Writen by: Christina Goggi

There’s a new beast in town and if you’re one of theCryptoLocker_Ransomware-300x300 unlucky folks to cross its path, then you’re either a few hundred dollars poorer or you’re stuck with a hard drive (or more) with encrypted data that you can’t retrieve (unless you have backups).

The CryptoLocker Virus is a nasty piece of malware doing the rounds that encrypts files on a victim’s computer and issues an ultimatum: Pay up or lose your data. CryptoLocker’s raison d’être is to literally extract a ransom from its victims, which is why malware of its type is also known as “ransomware”.
Continue reading

How Much Does Facebook Cost You Each Month?

Written by: Christina Goggi on October 8, 2013

Nobody wants to be a buzzkill, and the Facebook-costs-300x201owners and management of small to mid-sized businesses probably have a couple of dozen more important things to do at any one point in time than to police their employees’ Internet usage. But have you ever stopped to consider just how much does Facebook cost you each month? Whether you pay a fixed monthly fee for bandwidth or a variable cost depending upon usage, it’s not just bandwidth that we’re talking about. Facebook and other non-business uses of the company’s Internet connectivity can add up quickly and cost you far more than you ever realized, impacting productivity and morale to bandwidth utilization. Let’s look at each one in a bit more detail. Continue reading

BCW412: 10 Reasons To Monitor Employee Internet Usage

The Business Computing Weekly Podcast Episode # 412

Studies show that 60% of online shopping and 70% of internet pornography traffic occurs during normal business hours. It is wise to establish careful monitoring and control of internet usage at your business.

1: Lost Productivity

A small business with 50 employees with average costs of $20.00 per hour each = $1,000 per hour. If each employee wastes just 1 hour per week  on the internet, and not working  it costs $52,000 per year in lost productivity. That’s less than 15 minutes per day per employee. Some recreational use maybe ok, but within pre-approved limits, and times.
Continue reading

Strategies for boosting your practice’s information immunity

Introduction

Every day, viruses – along with worms, spyware, Trojans, bots, rootkits and other malicious intruders – infect millions of computers and shut down businesses large and small all over the world. Medical practices are not immune to these threats and their ensuing data breaches.

Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices.
Continue reading