Security

Security round up

Security round up With so much cyber security news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Security round-up of the three top cyber security stories. Federal bug bounty programmes seem to pay off The United States Marine Corps is a branch of the United […]

Continue reading

The best patch management strategy for 2019

Patch management causes headaches. Just ask any IT manager or sysadmin! How do you keep all your systems patched against the never ending onslaught of security vulnerabilities?

Continue reading

Regulatory Compliance Requirements for Business Situations

Compliance is everybody’s business SMBs must be just as concerned with compliance as enterprises Regulatory compliance is a big focus for big businesses today. Privacy concerns are driving government regulation, and some industries are proactively adopting their own privately enforced rules in an effort to head off further government interference. Enterprises are in the spotlight […]

Continue reading

 “View As” Facebook hack affects 90 million users

 “View As” Facebook hack affects 90 million users In late September Facebook revealed details of a security breach they had apparently first spotted close to two weeks earlier. The problem was rooted in a feature (View as) allowing users to view their Facebook pages the way others would see them, which inadvertently allowed attackers to […]

Continue reading

Honeypot Security System Strategy

Sweeten your security strategy with a honeypot security system Implementing honeypots and honeynets as part of your network intrusion prevention/detection process   We’ve all heard the old saying that you can attract more flies with honey than with vinegar.  When the pests we’re dealing with are network attackers and intruders, most of us focus on […]

Continue reading

Consent is not enough (part 2): GDPR recordkeeping, reporting and notification requirements

Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent can be key to proving that your organization’s collection, storage, and processing of personal data of individuals is lawful under the GDPR.  Then earlier this month, in part one of the “Consent is not enough” series, I discussed […]

Continue reading

The Dark Web: Is it a threat to your organization?

As a corporate network admin or security professional, you probably think of yourself as one of the good guys in the cyber world. And that means you probably rarely venture over to the wrong side of the virtual tracks, where the bad guys hang out. Sure, you’re aware of and understand the old adage that […]

Continue reading

Consent is not enough (part 1): GDPR data security requirements

The EU’s General Data Protection Regulation has been in full force for almost three months as of this writing, but many companies are still struggling with the challenges of attaining and maintaining compliance with its numerous complex requirements. Last month, in my article titled Think you’re GDPR compliant? Think again, I wrote about how consent […]

Continue reading

Last month’s top cybersecurity stories – August 2018

With so much cybersecurity news flying around, it is hard to keep track of the bigger stories that emerged. Here is the GFI Software round-up of the three top cyber security stories of August 2018. Fortnite app comes to Android, bringing multiple security worries Wildly popular shoot-em-up game, Fortnite, finally came to Android this month, […]

Continue reading

Nonprofits need IT security and communications software too

Nonprofit organizations do not follow a lot of the same rules as other businesses. They normally deal with grants, donations, and monies for other sources than themselves. Every nickel and dime has to be accounted for. Nonprofits have to make sure they can tell you which cause the money you donate will be helping. With […]

Continue reading

Find us on Facebook

Follow us on Twitter