The IBM Internet Security Systems X-Force® research and development team has recently issued a white paper on Internet Security threats. Some of the key findings are Continue reading “Results of Internet Security Survey”
What does the largest credit card theft teach us?
A 28-year-old man was charged with the largest credit card theft ever in the United States, in which more than 130 million card numbers were stolen, the US Justice Department said. Albert Gonzalez, of Miami, Florida, and two co-conspirators were accused of hacking into the computer networks of firms supporting major American retail and Financial organizations and stealing data. Continue reading “What does the largest credit card theft teach us?”
Another incident and more questions
Network Solutions had an IT Security incident in June this year that compromised more than 573,000 credit and debit cardholders. In what is becoming a very regular post incident debate the issue being asked is – Do certifications such as ISO27001, PCI really beef up IT Security in companies? Continue reading “Another incident and more questions”
Botnets – What you need to know
Botnets are suddenly in the news for all the wrong reasons. What are botnets and why are they in the news?
Employee IT Security behavior turns worse
A new study released by the Ponemon Institute reveals that there is a general lack of awareness and enforcement of computer security policies at many companies. The rate of non-compliant employee behavior appears to be getting worse over time. Continue reading “Employee IT Security behavior turns worse”
Cardinal Rule in IT Security – Remove admin rights for end users
In many organizations, End users are generally found to have administrative privileges over their desktops and laptops. But this could turn out to be one of the most potent IT security risk faced by the organization. Continue reading “Cardinal Rule in IT Security – Remove admin rights for end users”
It doesn’t matter where the weakest link is as long as it exists.
Day in and out we are reading and listening to news about how lost and stolen data, Virus attacks crippling organizations, unauthorized software that may contain malwares and so on. While it is impossible to eliminate IT risks altogether, certain steps can aid in placing less reliance on the persons and processes and more on technology. At the end of the day it is better to Push Security to End Users than to expect compliance. Continue reading “It doesn’t matter where the weakest link is as long as it exists.”
Increasing threats from Malwares – Controls
Malwares are malicious softwares that are created with a intention to damage information processing facilities. It is different from error in software which may cause the same end result but is not intentional. Malwares are written with a specific purpose to cause damage. What are the controls you can use for protection
Continue reading “Increasing threats from Malwares – Controls”
Physical Security – Welcome The weakest link in IT-security
Companies often end up investing huge amounts in creating logical and network security perimeters and at times physical security is relegated to the background. According to New York Post, A civilian official of the NYPD’s pension fund has been charged with taking computer data that could be used to steal the identities of 80,000 current and retired cops. According to news reports, Bonelli bypassed the security guard on duty by flashing an expired ID card. His name was also not on a list of authorized personnel. Continue reading “Physical Security – Welcome The weakest link in IT-security”
Information Leaves when Employees Leave
More than half – 59 per cent – of US workers made redundant or who left their job in 2008 admitted swiping confidential corporate data, such as customer list, before they left, a new study claims. Continue reading “Information Leaves when Employees Leave”