An estimated 90 percent of all emails in mid 2010 were spam; contrast this against seven percent in 2001. To make matters worse, most of these are fraud or deceptive in nature, and may contain malware or other security risks. Anti-spam laws that try to control the menace have met limited success.
With the recent press around the breaches at Sony Entertainment and Wiki Leaks, the data security market continues to grow its share of information technology budgets.
Consumers would be shocked to discover just how vulnerable they are to clickjacking. Even though it exploits some serious computer security issues, it is possible to defend against. Here is how.
Small business owners are no less susceptible to cyber attacks than big companies, but typically have no personnel to help secure their business from these threats. This article will provide cyber security tips to help small business owners secure their businesses at a very minimal cost.
Vulnerability scanning methodologies provide IT security staff and administrators with ways to detect problems with a network before a malicious attack happens. Various types of scans and tools permit the administrator to know which vulnerabilities pose the greatest risk to the environment.
As the Internet has expanded to do more tasks than were ever envisioned, the latest manifestation is the Cloud. The “Cloud” is the Internet, but what makes it different is that Cloud services have a destination. You can store files or run programs. But recent events have made its security suspect.
Over 350 million people and businesses use Facebook and other social media websites. Many of those people post information that might otherwise be considered private or confidential about themselves (and sometimes the places where they work). Do these employees place your business at risk?
In April of 2011, the Verizon RISK team, the US Secret Service and the Dutch High Tech Crime unit released the latest version of the Data Breach Investigations report. It is the culmination of a year long study defining types, methods and characteristics of cybercrime.
Anyone, and I mean anyone, can break into your computer, your network or personal folder and view, steal or compromise your information. If Google or the Pentagon can get hacked, you, too, can be hacked. But you can prevent 80-90% of hackers from accessing your system if you follow some basic rules
How do you protect your systems and its contents? That’s where information security comes in. It is concerned about policies, strategies, procedures, tools and mechanisms to safeguard information and information systems from unauthorized access, alteration, theft or physical damage.