Tag Archives: cyber security

Encryption in Messaging Apps: How Secure Are Your Communications?

encrypted messaging apps

Anti-virus software and firewalls are common security technologies we’ve been taught to prioritize. Encryption deserves the same respect.

Topics: , , ,

Password Management Sucks But it Doesn’t Have To

password management

There are a lot of tips and tricks to managing a bevy of secure passwords for the dozens of sites we need to login to. Some are best avoided, some are downright stupid, and some will save you a lot of headaches. Let’s look at the pros and cons of a few different options.

Topics: , ,

3 Tips for Responding to a Data Breach

how to respond to data breach

Unfortunately, no data protection plan is 100% foolproof, and that’s why you need to know exactly how to respond to a data breach if it happens to your business.

Topics: , , ,

2 Key Challenges To Fighting ‘Dark Nets’ and Onion Networks

dark nets and onion routing

My last post gave an overview of the problems law enforcement agencies face in investigating and apprehending criminals as the latter increasingly make use of encrypted communications and so-called “Dark Nets.” A great deal of tension exists between law enforcement’s need to solve crimes and the legitimate worry of citizens losing civil liberties in the process.

Topics: , ,

An In-Depth Look at Managed Physical Security and Opportunities for MSPs

managed security

The idea of managed security is nothing new, but has traditionally been focused more on cyber threats. Now both customers and MSPs are starting to realize the value of managing security on the physical side of the fence.

Topics: , , ,

Video Surveillance Technology for MSPs: Key Selling Points and Considerations

surveillance and MSPs

Managed service providers looking for lucrative products or services to add their portfolio may need to look no further than video surveillance.

Topics: , , , , ,

The Other Side of Security and Privacy

cyber security and law enforcement

Privacy and security have been ongoing concerns here on the Recovery Zone, but for the most part we’ve discussed ways to protect you and your data. We haven’t yet touched on the reality of how advances in technologies and best practices are aiding criminals in hiding their illegal actions from law enforcement agencies.

Topics: , , ,

Quick Guide to Securing Your Smartphone from Theft and More

securing your smartphone

Today, most of us still carry wallets or purses around, but the most private information is often found on our phones. Losing a wallet usually pales in comparison to the damage a thief can do with the information stored on your phone.

Topics: , , ,

How to Keep USB Drives from Being Your Nightmare

USB drive

There is certainly nothing about the thumbdrive that gives off the impression that it could be used for nefarious reasons, but that’s exactly what is happening.

Topics: , , ,

Kicking the Java Habit: Are You Ready to Give It Up?

kicking the Java habit

Java is one of the most popular programming languages in the world. It’s used in countless web browser, mobile devices, televisions, and even automobiles. Yeah, Java is just about everywhere these days, but unfortunately, that widespread usage has garnered the attention of cybercriminal nation.

Topics: , , ,

How do DDoS Attacks Affect Business Continuity Planning?

magic, business continuity and DDoS

Business continuity involves preparing for and responding to any issues that could affect your ability to do business. But has your business taken DDoS attacks into consideration?

Topics: , , , ,

A Few Lessons about Using AWS and Other Cloud Providers

Amazon Web Services

What sort of measures are in place from Amazon or other hosting companies to prevent hackers or cyber-criminals from getting full access to your systems?

Topics: , , ,

Creating a DDoS Action Plan, Part 2: Incident Response

cyber security and DDoS response

In last week’s post, I went over some useful measures for preventing DDoS (Distributed Denial of Service) attacks. Because no prevention plan is 100% effective, you need to put responsive measures in place to make your DDoS action plan as close to being foolproof as possible. Let’s dive in.

Topics: , , ,

5 Common Encryption Algorithms and the Unbreakables of the Future

common encryption algorithms

Encryption comes in many forms and it’s essential. There are the most common encryption standards, but what does the future hold?

Topics: , ,

One Guy’s Opinion: Managing the Real Risks of the Cloud   

the real cloud dangers

You can’t go “all in” on the cloud unless you take some local measures first. Here’s MSP Guy Baroan’s advice for harnessing the cloud’s full power, without putting your business or clients at risk.

Topics: , , ,

5 of the Most Effective Online Scams (And What’s Being Done About Them)

most effective cyber scams

According to AntiFraudNews, 289,874 internet fraud complaints were made to the Internet Crime Complaint Center in 2012 alone. Here are the five most effective ways cyber criminals are fooling computer users.

Topics: , ,

Creating Your DDoS Action Plan, Part 1: 3 Preventive Measures

preventing DDoS attacks

When it comes to DDoS attacks, you want to address the problem in two parts: prevention and response. This post will focus on some preventive measures you can take.

Topics: , , ,

Cloud Backups Might be Your Best Defense Against Ransomware

defending against ransomware with cloud backups

Ransomware isn’t just a trending thing—it’s becoming a serious criminal enterprise. Luckily, secondary cloud backups with StorageCraft can protect from some pretty nefarious goings on.

Topics: , , ,

Resilient Monkey Business in the Cloud: Netflix and the Mighty Simian Army  

Netflix's Simian Army

Netflix recently slapped the open source label on Security Monkey, the piece of technology that helps them monitor their cloud environments for security threats. But that’s just one monkey in their “Simian Army.”

Topics: , , ,

6 Cyber Security Myths Dissected and Busted

cyber security myths

There are countless myths surrounding the cyber security conundrum, and the ability to separate fact from fiction could play a vital role in protecting your organization.

Topics: , , ,

Your Biggest Security Threats are Convenience and Ignorance

security threats: convenience and ignorance

One can speculate as to why human error is a key piece of so many security breaches, but the fact is that these errors are likely the result of one (or both) of two things: a need for convenience, or simple ignorance.

Topics: , ,

5 Must-Have Mobile Security Features For MSPs

mobile security features for MSPs

Sure. You’ve got your little PIN code to prevent unauthorized access to your phone, but the increase in sophisticated mobile security threats makes the thought of hording confidential data in this environment an unsettling one.

Topics: , , ,

Home Sweet Automated Home: A Look at Home Automation Tech

Internet of things

Home automation devices are really neat, though they do have some security risks and other considerations. Let’s take a look at tech changing our homes for the better.

Topics: , ,

There are Some Big Security Problems with How You Communicate Everyday

email and text security

As people know in the IT industry, good information security is a combination of good security protocol and judicious practices. The trouble is that so many people are ignorant of basic cyber-security concepts.

Topics: , , , ,

Evernote, Feedly, and 5 Lessons From Recent DDoS Attacks

evernote and DDoS

By recruiting an army of enslaved “zombie” computers, a distributed denial of service attack can easily bring a website, app, server, or entire network to its knees with a flood of traffic requests. Its effectiveness is alarming and judging from all the recent activity, occurrences are on the rise.

Topics: , ,