Turn back the clock to late last year. At the height of the holiday season, between November 27 and December 15, hackers certainly gave new meaning to the term “hit the bull’s-eye!”
Cybercriminals toyed with retail giant Target, known for the circular red and white logo that symbolizes its name. Information from 40 million guest debit and credit card accounts was stolen – or so it was thought. The initial estimate, already among the largest in U.S. corporate history, turned out to be a fraction of the total. Today, it ranges from 70 million to 110 million, depending on reports. Continue reading →
The Business Computing Weekly Podcast Episode # 42
This episode of Business Computing Weekly I want to share with you 10 different ideas to increase sales, and build customer loyalty.
– Increase Your visibility in your community by networking and joining community organizations
– Rewarding current customers with exclusive content
– Offer referral programs to current customer to bring in new customers
– Offer non competing businesses a link exchange
– Make good use of downtime for marketing
– Create and maintain a blog and update it on a regular basis
– Add links from vendors or suppliers sites you your own
– Fill your site with helpful information and content
– Get busy with Twitter, Linkedin and Facebook
– Work on your website! Make sure its fast clean, and easy to get useful information
– Create your own mastermind group using Google+ communities or LinkedIn group.
The Business Computing Weekly Podcast Episode # 419
This episode, the focus of the podcast turns to keeping your network safe and protecting your data. The following are discussed.
1. Hackers Vs. Crackers. Threats come from many sources including your employees
2: Be careful of movie devices, and BYOD (Bring your Own Devices).
3. The ongoing battle of Zero Day attacks
4. 95.6% of mobile devices users put company data at risk by using public wifi
5. Reasons to develop a layered security approach
6 Crackers are taking advantage of social networks
7. The responsibility that comes with large amounts of storage
8. Keeping patch management front and center in your policies
9. Thoughts about “Shoulder Surfing”
10. 32% of IT Admins do not test their backup solutions
11. When employees of rogue. Stealth technologies in the workplace.
It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to online adult websites was quite controversial with many people saying that it is not up to the government to decide what websites people can visit at home. It’s funny how, within only a matter of few weeks, official figures released under the Freedom of Information Act show that there have been thousands of blocked attempts to access pornographic websites. The official version is that users typically end up on these websites accidentally, they come up as pop-ups from other websites and that automatically refreshing websites will generate more hits per user – a feeble attempt to wipe egg off their face.
Why does this happen
It’s difficult to pass judgement on this issue. My view is that when someone is in their office, bored or tired after a long day, and having ‘exhausted’ their energy on Facebook, they might think that a quick peek at a ‘naughty’ website will not harm anyone? It’s also fair to say that most users probably already know that a web filtering solution is in place, and that their internet activity is monitored, so most of these are more likely than not deliberate attempts to access blocked online material. A user might come across an adult website while researching other topics, but the sheer number of attempts detailed in the statistics simply does not add up to this conclusion. When a specific website is visited, then it indicates intent to do so; however that’s up to the reader to judge Continue reading →
Not everyone understands that network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base. Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are. Continue reading →
GFI WebMonitor 2013; this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of the corporate network and provide continuous filtering protection whether employees are in-house or on-the-go. Continue reading →