I just came a across an article that I wanted to discuss. The article is titled “10 security mistakes that will get you fired” written by Roger A. Grimes. I have know too many sysadmins and IT security specialists that have committed at least one or more of these huge mistakes. I’ll cover the highlights here with a link below as well.
Mistake #1 Killing Business Functionality
Although network security is job one to a IT professional, it is not to the company you are working for. Closing down critical business information systems while trying to remediate an intrusion can find you in hot water with management. Just assume management will believe the loss of business systems will outweigh the cost ridding the system from the bad guy.s Continue reading →
Unsolicited email or spam may be a mere nuisance for most emails users, but for an IT administrator spam is a headache and a major security threat. More than 3% of all spam includes a malware payload, but that doesn’t mean that the remainder is safe. Far from it. You can still be directed to a website that is infected by clicking on a link in that email. Continue reading →
Email is by far the number one way networks are compromised and the main route for data leakage. Fortunately there are some simple ways to safeguard this vital asset and the resources your email connects to.
1. Proper passwords
Too many email accounts are protected by passwords weaker than a Tour de France racer’s bicep. Simple passwords are simple to remember – so left to their own devices, that is what end users tend to choose. Continue reading →
Cyber attacks against small business establishments as well as corporations are very common and many small business firms find it difficult to bear the financial loss created by such attacks. It has become all the more necessary to adopt effective steps at workplaces to ensure security of the computers. Many companies introduced training programs for the employees on how to ensure digital security. As the first step the employees are trained how to avoid spam as well as the attachments of the spam messages, how to avoid outside instant messaging clients etc. Improper and ineffective uses of E-mail through the company’s computers in many places have led to litigationin many cases. E-mail manners are quite essential for smooth running of a business. Continue reading →
The Business Computing Weekly Podcast Episode # 419
This episode, the focus of the podcast turns to keeping your network safe and protecting your data. The following are discussed.
1. Hackers Vs. Crackers. Threats come from many sources including your employees
2: Be careful of movie devices, and BYOD (Bring your Own Devices).
3. The ongoing battle of Zero Day attacks
4. 95.6% of mobile devices users put company data at risk by using public wifi
5. Reasons to develop a layered security approach
6 Crackers are taking advantage of social networks
7. The responsibility that comes with large amounts of storage
8. Keeping patch management front and center in your policies
9. Thoughts about “Shoulder Surfing”
10. 32% of IT Admins do not test their backup solutions
11. When employees of rogue. Stealth technologies in the workplace.
The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, the Guardian, E! The compromised accounts were then used to spread pro-Syrian government messages and even fake news – news which led to a temporary dip in the Dow Jones and huge $136 billion in value. The latest victim of this hacking spree has been the satirical news website “The Onion”. After taking these attacks with a pinch of salt and posting several satirical articles, The Onion has posted an article detailing how this was done. Continue reading →
We had published an article called ‘13 IT Projects to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that.
Our seventh project suggestion was for spam filtering – here’s what we had to say:
Spam volumes continue to rise, and Outlook’s junk mail filters just are not enough anymore. 2013 can be the year you finally get a handle on spam by implementing spam filtering. Whether you deploy something on-premise or in the cloud, blocking spam, phishing, and malware infected messages before they get to your users is something everyone will appreciate. Continue reading →