Don’t forget to audit your security

The security of your computer, network and whole system is likely something that has caused moments of stress and even worry. In order to ensure that a business is secure, companies often adopt a security strategy. While these strategies are great, there is one common element that many businesses forget to carry out – the…

The Situation – Microsoft Windows XP – Part 2

Updates: Will Microsoft Security Essentials be supported after April 8, 2014? Microsoft Security Essentials will not be available for download on Windows XP after April 8, 2014. If you already have Microsoft Security Essentials installed, you will continue to receive anti-malware signature updates through July 14, 2015. However, please note that PCs running Windows XP…

About the recent Apple SSL bug

Ensuring the security of your systems and computers can sometimes seem like a full time job and an uphill battle, especially with the increasing number of security issues being discovered. From bugs in software to malware, there is almost always some attack challenging the system security and potentially leading to a security breach. The other…

Have you heard of spear phishing?

Computer and network security is an important issue to many business owners and managers. One of the most common security threats companies come across is phishing. Because phishing has become so prevalent, most people are aware of these underhand methods. This has led to hackers having to come up with new phishing methods, one of…

The ultimate guide to defense in depth

Even the most reliable business network security and sophisticated user credentials can be vulnerable to cyber attacks to some extent. The concept of a comprehensive layered security, called defense in depth, is based on a strategy which has been around since the time of the Romans. A multiple-layered defense is created to prevent the advancement…

Device security while traveling

The Olympics is one of the most popular and well known sporting events in the world, and the 2014 Olympic Winter Games are well underway. This round, they are in Sochi, Russia and like every other event, there have been various organizational issues to deal with. Unlike the last Olympics however, one of those issues…

The top 5 ways to avoid getting hacked while visiting Russia (or anywhere, for that matter)

Yesterday (Feb 5 2014) NBC News ran a story claiming that if you bring your mobile phone or laptop to the Sochi Olympics, it’ll immediately be hacked the moment you turn it on. The story was fabricated. After further examination we found that the technical details of the hack didn’t make sense. Really, the exploit…

Dropbox: Taming the Wild West

A modern-day Wild West can be found in the slapdash enterprise use of cloud-based file storage and sharing. But new security technologies puts user-managed security atop those platforms without burdening the IT department with lots of administrative overhead. “Transparent layers of encryption with enterprise-owned and managed private keys can now be implemented on top of…

Managed antivirus – what is it?

Business technology is becoming increasingly complex to manage. In fact, many business owners and even IT departments often don’t have the time to oversee every business function. One area where help is often needed is with regard to security, and more specifically antivirus based solutions. There are so many different options available that it can…

Is your data in the Cloud safe from prying eyes?

By now we’ve all heard the ruckus about the NSA’s scanning of email and electronic content. One thing that’s been largely overlooked by the overwhelming media response to this incident has been similar ongoing activity. For some time most of the major players in the Cloud have had embarrassing releases indicating that they have opened…