I just came a across an article that I wanted to discuss. The article is titled “10 security mistakes that will get you fired” written by Roger A. Grimes. I have know too many sysadmins and IT security specialists that have committed at least one or more of these huge mistakes. I’ll cover the highlights here with a link below as well.
Mistake #1 Killing Business Functionality
Although network security is job one to a IT professional, it is not to the company you are working for. Closing down critical business information systems while trying to remediate an intrusion can find you in hot water with management. Just assume management will believe the loss of business systems will outweigh the cost ridding the system from the bad guy.s Continue reading →
Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices. Continue reading →
It is not uncommon for marketing teams or advertising agencies to take a current IT ‘buzzword’ and use it as part of their campaign to promote a new product or service. Advanced Persistent Threat (APT) is one of those buzzwords. Should we consider this term to be another form of scaremongering or is there a real threat behind it? This blog post will briefly outline what APT is and whether or not organizations should take what we are told by the advertising gurus with a pinch of salt. Continue reading →
Removable storage devices offer a big convenience for easy transfer of data from one computer to another – but they also bring with them a big security risk. The ability to copy gigabytes of company information to a tiny card or drive also makes it easy for employees (or anyone else who can gain physical access to one of your networked systems) to deliberately steal critical data or inadvertently subject it to unauthorized exposure. That could lead to a very costly disaster if company secrets get into the hands of competitors or if sensitive data (such as clients’ personal information) is exposed in violation of regulatory stipulations. Continue reading →
We had published an article called ‘13 IT Projects to Include in Your Plans for 2013’ in which we suggested 13 great IT projects for you to consider; we decided to publish some follow-up articles to help do just that.
Our seventh project suggestion was for spam filtering – here’s what we had to say:
Spam volumes continue to rise, and Outlook’s junk mail filters just are not enough anymore. 2013 can be the year you finally get a handle on spam by implementing spam filtering. Whether you deploy something on-premise or in the cloud, blocking spam, phishing, and malware infected messages before they get to your users is something everyone will appreciate. Continue reading →