• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Archives for March 2013

Securing healthcare data in a dangerous cyber world

  • Posted on:March 31, 2013
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Every business in the healthcare industry likely has many mobile devices, laptops, tablets and other moving pieces with patient and employee data easily accessible on it. On HealthIT Security, Bill Kleyman wrote that this demands organizations to take a closer look at data security across their company, as trends like BYOD (Bring your own Device) and the consumerization of IT means there are more inherent risks to doing standard business.

Read More
Tags: cybercrimePrivacy & Policy

Don’t ignore the risks of the cloud

  • Posted on:March 31, 2013
  • Posted in:Cloud Computing, Privacy & Policy
  • Posted by:
    Trend Micro
0

There are a lot of risks carried when adopting cloud computing. Like any other new technology, companies have been trying to work out the kinks of the cloud as far as security is concerned.

Read More
Tags: Cloud SecurityPrivacy & Policy

5 Questions to Ask Your RMM Vendor about Integrated Security Solutions

  • Posted on:March 29, 2013
  • Posted in:Cloud
  • Posted by:
    Ryan Delany
0

Remote management and monitoring (RMM) vendors often offer an integrated security solution with their core product. But how does the security offered by these integrated options compare? Below are the questions to ask your RMM vendor to make sure you get the full picture of the security being offered. 1. Is the security solution included…

Read More
Tags: antisypwareantivirusask your vendorBYODchoosing security solutionfree securityintegrated securityremote managementRMMsecurity selectionsecurity solutionselecting securityvendorwhat to ask

Privacy concerns cause Google Reader to close

  • Posted on:March 28, 2013
  • Posted in:Compliance & Regulations, Current News
  • Posted by:
    Trend Micro
0

Many Internet browsers were saddened earlier this month when they found out Google was going to completely shut down its Reader service. Initially, The Los Angeles Times said the closing was due to low usage, but a report by AllThingsD shows that the company killed it because they didn’t want to have to keep updating the privacy laws of the program.

Read More
Tags: Compliance & RegulationsCurrent News

Data must be protected at every level

  • Posted on:March 28, 2013
  • Posted in:Compliance & Regulations, Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

Moving into the future of data security will be something every business needs to undertake in the near future, if not immediately.

Read More
Tags: Compliance & RegulationscybercrimePrivacy & Policy

Top 10 AWS Security Tips: #7 Monitor Your Instances

  • Posted on:March 27, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

So far in this series, we have shared tips for securing access to your AWS resources, hardening your system and protecting with a firewall and IPS combination. At this point, your applications running on Amazon Web Services are resilient to attack, but it is critical that ongoing monitoring be a part of your overall security strategy. Monitoring…

Read More
Tags: AmazonAmazon EC2amazon machine imageamazon web servicesAWSCloud SecurityCloudWatchEBSfile integrity monitoringFIMhow to secure AWSintegritylogsmonitoringpoliciesPublic Cloud

Use the strength of big data for security

  • Posted on:March 25, 2013
  • Posted in:Cloud Computing, Current News, Privacy & Policy
  • Posted by:
    Trend Micro
0

The amount of hype around big data in the technology world is enormous, but not many truly know what the technology is. Ashwin Pal wrote on CSO Online that people are still not clear as to what constitutes as this kind of information even though it could have data security implications.

Read More
Tags: Cloud SecurityCurrent NewsPrivacy & Policy

Security data needs to be even across enterprise

  • Posted on:March 25, 2013
  • Posted in:Cloud Computing, Privacy & Policy
  • Posted by:
    Trend Micro
0

As the need for data security has grown across enterprises, so too have the number of tools and measurements being used to help companies manage their risk and network safe

Read More
Tags: Cloud SecurityData PrivacyPrivacy & Policy

Bring Your Own Device (BYOD) and Patient Privacy

  • Posted on:March 22, 2013
  • Posted in:Security
  • Posted by:
    Trend Micro
0

By Vic Hargrave The healthcare industry has certainly felt the affects of the Bring Your Own Device (BYOD) trend. More often than not doctors, nurses, and other clinical support staff carry mobile smartphones and tablets. According to the article The Usage of Tablets in the Healthcare Industry, doctors and nurses were some of the early adopters…

Read More

It’s tax season: Time to make sure security is strong

  • Posted on:March 20, 2013
  • Posted in:Cybercrime, Privacy & Policy
  • Posted by:
    Trend Micro
0

This year, tax day falls on April 15. It’s coming mighty quick, so those that have waited until the last minute could be in line for quite the scramble once they start doing their taxes. With the amount of online services, it may seem easy to do taxes online in a care free manner, but Pedro Hernandez wrote on Small Business Computing that companies and people alike need to keep data security in mind when preparing taxes.

Read More
Tags: cybercrimePrivacy & Policy
Page 1 of 412 › »

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.