Security company Websense released a survey of of 1,300 IT professionals worldwide revealing that although social media or the use of “Web 2.0″ technologies such as blogs , wikis and social networks are already pervasive in business, a majority of IT managers seem ill equipped to manage its use, much less protect against security concerns associated with it.
Last May 14th, reports indicated that hackers had launched a phising attack on Facebook ’s 200 million users, successfully stealing passwords from some. The hackers set up websites designed to look like the Facebook home page. Victims were directed to log back in to the site, but were routed to the fake site instead, unwittingly giving away their passwords.
Looking for a website or online resource for Security Tips and Best Practices? Check out the Federal Trade Commission ’s (FTC) OnGuardOnline program , which the FTC began in partnership with cybersecurity experts, online marketers, consumer advocates, and federal officials in 2005. While there, check out the articles and free resources such as videos, games, and downloadable files to help you guard against Internet fraud , hacking, and other security threats.
PC World posts a nice overview of the highly infectious Conflicker Worm. The Worm is dangerous as it uses several methods of attack. Once one computer in a network is infected, it often has ready access to other vulnerable computers in that network and can spread rapidly.
Lately, we have been hearing about how quickly the Conficker Worm is spreading. News sources have pegged the number of infections in the neighborhood of 3.5 million computers. Given that Microsoft issued a patch for the flaw targeted by the Conficker worm and the use of strong passwords can prevent much of the spread, it seems odd that enterprises (large corporations) with network management would be hurt by the worm.
In 2009, IT experts predict more malware and other attacks on company networks coming from mobile devices, social networks, and faster Internet connections, among other trends. IT experts predict a substantial uptick this year in the number of small businesses using smart phones — as well as flash drives, social networks, and faster Internet connections.
Virus Attack: What to Do on Zero Day
Published with permission from TechAdvisory.org. Source.
As a kid I used to write messages with lemon juice and when the juice dried I had a secret message (or so I thought) that was viewable when held up to the light. Of course these child hood secret messages only work in the mind of a child, but not the corporate shield of real business.
Wireless networks have moved to the small business arena, helping offices spread Internet connectivity and mobility at a low cost, but bringing security concerns. Unauthorized access points can undercut your Wi-Fi security. Read the story on Inc. Technology…
Wireless networks have moved to the small business arena, helping offices spread Internet connectivity and mobility at a low cost, but bringing security concerns.
A variety of software and services — from Lojack to GadgetTrak — are designed to help recover a lost or stolen notebook computer. These products have become more appealing to businesses of all sizes. Read the story on Inc. Technology…
A variety of software and services — from Lojack to GadgetTrak — are designed to help recover a lost or stolen notebook computer.