Top 5 Common Activities that Break Company Security Policy

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

Read more

Backing-Up Your Data vs. Backing-Up Your PC

In my computer security classes, I tease my students that “Backups are good; restores are better.” The unfortunate fact of life is that computer hardware wears out and stops working. Software has bugs. Unfortunately, systems sometimes become infested with malware — so-called malicious software. A particularly ugly kind of attack, such as CryptoLocker, is called “Ransomware.” As Cybersecurity professionals, we call it crypto-viral extortion when a malware attack encrypts a user’s files and then demands payment to retrieve the key to restore the data.

Read more