Tag Archives: cyber security

When Do You Reasonably Need to Use Data Encryption?

which encryption to use

Encryption has been around for many years and comes in many forms. Should you be looking to encrypt every single device you own? What about your laptop or desktop PC? Does it make sense to encrypt your phone or server, and are there any trade-offs for that added security?

Topics: , ,

Top 7 Worst Data Disasters of 2014

data disasters 2014

There are some disturbing trends on the IT security front. According to IDTheftCenter.org, which gets updated daily, 2014 is on pace to surpass 2013 in total number of reported data breaches, possibly by a significant margin. Here’s a look at some of the absolute worst data disasters of the year and how they contributed.

Topics: , ,

Testing Employees’ Cyber Security Knowledge

cyber-security knowledge

How do IT admins test employees to see if they are being safe computer users? Here are a few ideas.

Topics: , ,

Radio Frequency Attacks and the Evolution of Hacking

radio-frequency hacking

Armed with a piece of malware known as AirHopper, hackers can attack those isolated machines over radio frequencies. Here’s what you can do to protect vulnerable systems.

Topics: , ,

Why You Need a Data Breach Response Plan and How to Make One

why you need a data breach response plan

With any luck, you might never need to use your response plan at all, but that doesn’t mean you don’t need one.

Topics: , , ,

What IT Risks are You Overlooking?

what IT Risks are you overlooking?

There’s a lot to consider when you are talking about safety and security: Failures, heat, human error, power, etc., but what are some things that are commonly overlooked?

Topics: , , ,

Is Homomorphic Encryption the Future of Enterprise Data Security?

homomorphic cloud encryption

Encryption has been fairly effective at keeping hackers out and providing a peace of mind for the people and organizations who adopt it. To eliminate the hassle associated with the decryption process, IBM has invested in homomorphic encryption, a cutting edge cryptography concept that could have revolutionary implications.

Topics: , , ,

Top 2 Best Practices for Employee Monitoring

employee monitoring

In many places, it’s completely legal to monitor employees, but that doesn’t mean you should do it with out thinking about a few things.

Topics: , ,

3 Preventive Security Actions That Don’t Require Employee Monitoring

ensuring security without employee monitoring

Rather than monitoring employees, you’re much better off using layered security solutions to prevent such vulnerabilities as malware, loss of IP (Intellectual Property) and other confidential information, and possible litigation resulting from illegal activity or non-compliance.

Topics: , ,

Cyber Insurance: What Is It and Do You Need It For Your Business?

cyber insurance

Cyber insurance is an outside-the-box concept that can help better manage the risks, and the huge financial losses that follow.

Topics: , ,

If Corporations Won’t Protect Consumer Privacy Can MSPs?

corporations and privacy

Corporations collect personal data for many reasons, but MSPs don’t have to sit idly by while consumer privacy dissolves.

Topics: , ,

Global Data Breaches and a Look at Cyber Crime by Country

world of cyber crime

You’ve probably read about China’s hacking and cyber-crime tendencies, but there are specialized attacks coming from countries across the world. Here’s who is doing what.

Topics: , ,

Do You Need Risk-Based Authentication? (RBA)

risk-based authentication

RBA takes various factors into account such as a user’s location, login time, device, and IP address to determine a risk score. If the risk score is too high, access to the network will be denied. If you’re worried about security, it might be time to implement RBA.

Topics: , ,

Network Virtualization: Security Benefits, Risks and Best Practices 

virtualization and security

If network intrusion and data breaches are topics that keep you up at night, security may be the fuel behind your virtualization aspirations.

Topics: , , ,

Somebody is Watching You: Understanding and Keeping your Privacy

information security

We spoke with some experts in the information security field about what companies are doing– or should be doing– to keep data completely secure.

Topics: , ,

Encryption in Messaging Apps: How Secure Are Your Communications?

encrypted messaging apps

Anti-virus software and firewalls are common security technologies we’ve been taught to prioritize. Encryption deserves the same respect.

Topics: , , ,

Password Management Sucks But it Doesn’t Have To

password management

There are a lot of tips and tricks to managing a bevy of secure passwords for the dozens of sites we need to login to. Some are best avoided, some are downright stupid, and some will save you a lot of headaches. Let’s look at the pros and cons of a few different options.

Topics: , ,

3 Tips for Responding to a Data Breach

how to respond to data breach

Unfortunately, no data protection plan is 100% foolproof, and that’s why you need to know exactly how to respond to a data breach if it happens to your business.

Topics: , , ,

2 Key Challenges To Fighting ‘Dark Nets’ and Onion Networks

dark nets and onion routing

My last post gave an overview of the problems law enforcement agencies face in investigating and apprehending criminals as the latter increasingly make use of encrypted communications and so-called “Dark Nets.” A great deal of tension exists between law enforcement’s need to solve crimes and the legitimate worry of citizens losing civil liberties in the process.

Topics: , ,

An In-Depth Look at Managed Physical Security and Opportunities for MSPs

managed security

The idea of managed security is nothing new, but has traditionally been focused more on cyber threats. Now both customers and MSPs are starting to realize the value of managing security on the physical side of the fence.

Topics: , , ,

Video Surveillance Technology for MSPs: Key Selling Points and Considerations

surveillance and MSPs

Managed service providers looking for lucrative products or services to add their portfolio may need to look no further than video surveillance.

Topics: , , , , ,

The Other Side of Security and Privacy

cyber security and law enforcement

Privacy and security have been ongoing concerns here on the Recovery Zone, but for the most part we’ve discussed ways to protect you and your data. We haven’t yet touched on the reality of how advances in technologies and best practices are aiding criminals in hiding their illegal actions from law enforcement agencies.

Topics: , , ,

Quick Guide to Securing Your Smartphone from Theft and More

securing your smartphone

Today, most of us still carry wallets or purses around, but the most private information is often found on our phones. Losing a wallet usually pales in comparison to the damage a thief can do with the information stored on your phone.

Topics: , , ,

How to Keep USB Drives from Being Your Nightmare

USB drive

There is certainly nothing about the thumbdrive that gives off the impression that it could be used for nefarious reasons, but that’s exactly what is happening.

Topics: , , ,

Kicking the Java Habit: Are You Ready to Give It Up?

kicking the Java habit

Java is one of the most popular programming languages in the world. It’s used in countless web browser, mobile devices, televisions, and even automobiles. Yeah, Java is just about everywhere these days, but unfortunately, that widespread usage has garnered the attention of cybercriminal nation.

Topics: , , ,