Regardless of physical location, businesses worldwide need to make disaster recovery and data security a top priority, or risk paying the price.Read More
Internet security is a major concern for every business that utilizes the internet. In other words, it is important for almost every business today.
With the presence of employee-owned mobile devices in the workplace growing rapidly, enterprise IT departments are advised to ensure their mobility policies address the myriad data protection challenges these devices present.
Part 1 of 2 parts IPv6 will change how we use the internet, again. To the typical user, there is no difference; web sites work the same. But email is a different story. When using IPv6, addresses are allocated in a different manner. Most end-users today get one IP address, which is shared between multiple…Read More
Applying the latest cloud provisioning and marketing analytics technologies, they’ve created an entirely new type of cloud service, Exploits as a Service, or EaaS.
Today’s disclosure by Google and Microsoft that they were tricked into serving malware highlights an inherent conflict of interest between advertising-based businesses and the security needs of their customers.
Adobe has issued a security advisory APSA 10-03 describing a new critical vulnerability in its products. This time, the primary target is Flash Player with multiple platforms—Windows, Mac, Linux, Solaris, and Android—all affected and is currently being exploited in the wild. Current versions of Acrobat and Reader—the target of last week’s vulnerability—are also affected by…Read More
Are you still a skeptic about cloud computing? Do you remember when you refused to bank online because it couldn’t be safe? I do. In fact, I even remember working with one of the leading banks in Canada when the CIO declared that no employees should have access to the Internet—for any business reason, ever….Read More
When your servers are in the cloud, then your own perimeter provides no protection, the security is often “lowest common denominator security” which undermines both confidence and compliance. Co-location of virtual instances and data with that of strangers, competitors and possibly even malicious actors (we have already seen criminal activity being hosted in Amazon’s EC2…Read More