The cloud is putting so much pressure on the old device-centric security model that it’s forcing a change to an identity-centric security model, where it matters far more who a person is than what device or network they are using. In a single day, one person might access cloud applications from his iPhone, home, main office, and Peet’s Coffee, and he may use his home PC, his work laptop, his phone, or even his Xbox. Trying to identify and secure what that person does based on a device IP address or network address is simply a lost cause.
Photo courtesy of Rubertu from Creative Commons Public Wi-Fi®-wireless network for high-speed accessing of the Internet- is nearly everywhere now. Hotels, coffee shops, airports, and restaurants advertise the convenience of Wi-Fi to their customers. Whether the Wi-FI is free or fee-based, you need to be aware of the risks involved when using public Wi-Fi hotspots….Read More
Photo Courtesy of Scubadive67 from Creative Commons Cookies aren’t just a delicious treat with milk. Cookies are text files that are created when users visit websites. They store information such as shopping cart contents, registration or log in credentials, and user preferences. When a user returns to a website, a cookie provides information and allows…Read More
If you’ve got an email account, you’ve had to put up with spam, or UBE (Unsolicited Bulk Email). It’s inconvenient, annoying, and can cause damage. Spam can open you up to the risk of malware, adware, and spyware. It can put your personal information at risk. Fortunately, there are steps you can take to minimize…Read More
If you type in an online search for “learn to hack,” you get over 28 million results. It’s pretty obvious that there are a lot of resources out there for anyone who wants to learn about hacking. You can even learn about specialized hacking: email, Facebook, MySpace, passwords. It’s all out there. Hackers have different…Read More
You know that you need security protection for your computer, but you may not know what to look for in Internet security software. What makes one type of Internet security different or better than another? Threats to your computer and data have changed over the years. As computers and networks have become more sophisticated, so…Read More
Many of today’s Internet scams originate overseas, especially in Russia and Eastern Europe. However, they do rely on a local component, and you want to make sure that you do not end up unwittingly becoming involved in cybercrime. You’ve probably seen ads for what appear to be great job opportunities. “Work from home! No experience…Read More
Just what are hackers, zombies, and bots? And why should you care? All three of these online threats can cause serious damage, either by getting at your private information or by gaining control of your computer. Here’s a quick summary of these dangerous three: Hackers A hacker is a person who creates and modifies computer…Read More