Target Breach Reveals Risk of Business Partners
It is well known that the Target breach cost the company $148 million and resulted in the resignation of the company’s CIO and CEO. Less well-known, is the fact that the attackers exploited an unsecured heating and cooling (HVAC) vendor with trusted digital connections to Target in order to circumvent Target’s security ...
Governments need to act on critical national infrastructure cybersecurity threats
Cyberattacks on critical national infrastructure have the potential to cause massive damage and disruption to entire nations. And research suggests that the threat is growing. A recent survey of CNI organisations in North and South America, for example, reveals 43 per cent have seen an increase in cyberattacks over the ...
The Legal Precedent Requiring Encryption in the Cloud
In one survey after another about the adoption of cloud computing, CIOs and other technology leaders readily admit that their top concern is data security. There is a growing number of government and industry regulations and standards designed to help protect the confidentiality of data that companies have in their care. The ...
White Networks
Internet of Things (IoT) needs “white networks” to scale and deliver the assurance we require for machine-things; white as in “clean and pure”. The IoT will contain all the devices on the current internet, plus many new devices used for machine-to-machine and industrial applications and services. In contrast to a ...
4 hidden economic costs of cybercrime
There are many obvious and headline-grabbing costs of cybercrime. There are many obvious and headline-grabbing costs of cybercrime. In the past few months alone there have been numerous high-profile data security breaches where hackers have obtained tens of millions of customer details, ranging from credit card numbers to medical records. ...
What is Criminal Identity Theft?
Identity theft gets all kinds of buzz in the news. It’s not hard to see why—in 2012, over 16.6 million Americans were victims of identity theft. What most people don’t know is that identity theft is much more than just stealing your credit card number. In other posts, I discussed ...
A Connected Nation: IoT in America in 2025
If there’s one thing that remains consistent about technology, it is that it’s always in flux. From tablets to phablets, smart cars to smart TVs, our devices are getting increasingly “smarter” and entwined with our daily routines. To better understand the consumer perspective on these ever-evolving technology trends, we conducted ...
11 Steps to Improve your Personal Digital Security
Everyone with an account on a smart phone, tablet, laptop or PC also knows about phishing, scamming, password and identity theft, and to some degree, file intrusion and hardware destruction through advanced malware. Probably less well known is the fact that savvy hackers will focus on individuals in specific businesses ...
Just What the Doctor Ordered
Cloud services are here to stay, and practically everybody is embracing them. In fact, the cloud computing industry is growing at the torrid pace of nearly 30% per year right now, according to Pike Research. Certainly healthcare service providers are getting on the cloud services bandwagon, either by choice or ...
Backup Security Best Practices
Network and mobile data breaches get much of the publicity today, but there’s another less publicized avenue susceptible to both insider and outsider attacks: backup. In early April, for example, Emory Healthcare in Atlanta lost the personal information of 315,000 patients when it discovered that 10 backup discs were missing. ...