Home / 2017 / March

Monthly Archives: March 2017

Docs.com Is Sharing Your Documents in Search Engines

A timely reminder of the need to be aware of exactly what you’re signing up to with online services.  Many users of the free docs.com sharing service aligned with Microsoft’s Office 365 are discovering that documents they believed to be private are indexed and accessible through public search engines: https://arstechnica.com/security/2017/03/doxed-by-microsofts-docs-com-users-unwittingly-shared-sensitive-docs-publicly/

Read More »

The Importance of a Security Culture across the Organization

Culture drives how people behave in groups and social (or work!) settings.  In this article for IBM’s Security Intelligence newsletter from September 2015, Kevin Beaver discusses the importance of driving a meaningful security culture across the organization – starting from the top and flowing down: https://securityintelligence.com/the-importance-of-a-security-culture-across-the-organization/

Read More »

GDPR: Halfway to What, Exactly, and Why Should I Care?

The General Data Protection Regulation (GDPR) is a piece of European law extending protection of information relating to natural persons (living people) beyond the previous narrower definitions of sensitive personal data to the full spectrum of “Personally Identifiable Information”.  In other words, any data that can be used to directly …

Read More »

Bank Fraud: The Game of Cat and Mouse

Impersonation (corporate or user), malware and Trojans, fraudulent emails, black markets, phishing, pharming, trademark abuse… There are myriad vectors of attack cybercriminals use to defraud and obtain a significant booty from the clients of the banking sector. Faced with this situation, the entities must bet on a proactive detection, which …

Read More »

Why Autocorrect for Passwords Is a Great Idea

It’s frustrating when you have to wrack your brain for a correct password and still get locked out of your account after continuous failed attempts. This unfortunate scene actually happens a lot to everyone, sometimes simply because people forget their passwords, but other times due to typos. In order to …

Read More »

Red Team: Thinking like the Enemy

“Know thyself and know thy enemy.” This maxim, drawn from the treatise The Art of War by the Chinese philosopher and military strategist Sun Tzu (2nd century BC), summarizes a few strategies to follow in any conflict. It is also the maxim that underlies the creation of the so-called Red …

Read More »

Top 5 Tips to Create a Culture of Security Awareness at Work

Mike Saurbaugh, a faculty member with IANS Research and independent consultant, stresses that companies should not frame their comprehensive security awareness program so much as a compliance task, but rather, a journey that leads to lasting behavioral changes. Employees need to understand their roles in helping the business achieve a …

Read More »

Securing Your Computer to the Fullest Extent

The only perfectly secure computer is turned off, disconnected, and kept in a safe. This is true but of no use. If you are looking for something a little more useful, start by considering what kinds of data you are protecting. Most of us are protecting banking, tax and credit …

Read More »