Security

Security used to be a standard talking point for Apple enthusiasts. PCs were riddled with viruses and vulnerable to hacking, but Apple users were safe. Not anymore. Stories about hacks and other vulnerabilities in Apple products are becoming ever more regular. Just last week, the latest...

Cybersecurity seems to be one of those problems that companies just throw money at.  It’s an established cost of doing business in the digital age, yet nobody seems to know how much “adequate” cybersecurity should really cost.  The main reason is that cybersecurity has so many wildcards. ...

“Spear phishing” is a targeted email attack against a specific organization designed to get logins and passwords in order to gain access to sensitive data or even financial controls. Here is how it works. The attacker will send out fake emails to everyone in the...

Big news for investors last week was the 4-hour shutdown of the New York Stock Exchange (NYSE) on July 8th. Early speculation by news outlets blamed the outage on a coordinated cyber-attack, most likely by China. Fuel was added to the speculative fire when United...

On the heels of the recently published CryptoWall blog, I have seen yet another attack propagated across a network. In this case, the client had numerous users who heedlessly browsed, downloaded, opened, or shared files. The end result underscores the critical need for user education. Why...

Let’s be clear: the password should be dead, but it isn’t. Most of us still type in several combinations of user names and passwords that are respected by the computer we log in to, the websites we visit, and the applications we use. Every once...