Securing Cloud Data

Information security in any public cloud can meet contractual commitments and still allow your data to escape into the wild. This discontinuity is the subject of articles across the web, including documented cases of secure infrastructure plus lax polices equaling a data breach. Cloud providers for storage, services, application, infrastructure, etc. provide services and pricing that many executives and end users find enticing. The per-click, per-gig or per-transaction-only fees get our attention. The built-in redundancy, access from anywhere and ownership-eliminating possibilities cause us to think, how can this be a bad thing? Finally, the rigorous security compliance standards that some cloud service providers meet allows us to think, this will be OK. And it can all go very bad with one click.

Read more

A Look Back at 2014 Security Breaches

This year has been a rocky year for computer security. There have been many large personal data breaches, including those of Sony, eBay, Michaels, Spec’s, Home Depot, Staples, Kmart, Dairy Queen, MBIA Inc., Jimmy John’s, Goodwill, P.F. Chang’s, California Department of Motor Vehicles, Sally Beauty Supply, and others. Many of these breaches took place over […]

Read more

Risk Management and Cyber Tips for Business

Okay, so Target was breached, and so was Home Depot, Dairy Queen, JP Morgan, Kmart, South Korea, and [name a company]. These are just the companies that made the news. In light of so many prominent businesses being breached, is there any business owner out there who still believes his/her business is secure and will not be hacked? If so, can I interest you in a bridge in Brooklyn?

Read more

Top 5 Common Activities that Break Company Security Policy

Many employees are not as well-versed in their company’s security policy as they should be. This may result in workers performing tasks that might seem innocent or benign on the surface, but which actually put the organization at risk of a security breach. Understanding what you are doing (as an employee) or what your users are doing (as a boss or manager), can help you work toward a viable resolution to these situations. In most cases, user behavior changes as well as implementation of new technological solutions can curb exposure to risk and increase security policy compliance.

Read more