Hacker Season Comes But Once A Year

stay secureIt's that time of year, the 2nd of December, typically known in the retail trade as 'Black Friday' has come and gone. Hackers are now in full swing, tempting and luring us into parting with our cash and identity for an empty promise. Black Friday, known among the retail trade as the start of the holiday shopping season is also the start of the Hacker's busiest period. This year, the biggest concern among technology experts is web-borne malware.

Black Friday, the day after Thanksgiving, is followed in marketing lingo by Cyber Monday. Both are big days for retailers and online fraudsters. Consumers should watch out for e-mails advertising incredible deals that seem too good to be true.

Add a comment
Read more ...

The Challenge – Security Vs. Mobility

The Challenge – Security Vs. Mobility

As the corporate workforce grows ever more mobile and the rampant availability of 3rd party, often unsecured wireless networks increases, IT managers have an ever growing challenge. Whenever employees travel and connect their computing devices to a wireless network in a hotel, airport or whatever, they are connecting their corporate devices into a pool of people that simply cannot be trusted. This simple connection puts at risk all data on the device to potential hacking and theft let alone viruses and malware. For this reason, IT managers have to protect the corporations intellectual property and finances by making the mobile devices as secure as possible.

If a machine is infected, it is often wiped clean and rebuilt as a precaution to ensure whatever malware has been totally eradicated.

So, regardless of where the worker is sitting, security needs to be as tight now as ever on their computer. Whether at Starbucks, or the local coffee shop or on the corporate network, it’s safest to assume that all networks are hostile and should not be trusted.

Corporate Network - Two Lines of Defense

Corporate networks can easily be the most secure. They can be developed and managed in a while that no public network can to ensure the security of its users. Use of the standard appliances running secured and hardened OS, with Firewall, IDS, IPS, Anti Virus, Anti Spyware, Anti Spam and Content filtering provide the first tier of defense.

Add a comment
Read more ...