
2015 Cyber Security Awareness Month
What is Cybersecurity? According to US-CERT, “The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein
What is Cybersecurity? According to US-CERT, “The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein
What are 3rd party tools? Everyone, from individuals to enterprises, uses third party tools and applications on their workstations, servers and mobile devices. Some examples
By now you should have heard that malware has been detected in apps available from Apple’s App Store. (Let’s take a short break to let
“My firm WILL be affected by ransomware.” If you intone that rather gloomy mantra to yourself every morning before you go to work, you might
Extortion is not usually a topic that employers have on their radar regarding their employees. Most employers know they need to protect themselves against viruses, and
Update: As of Thursday, August 6th, 2015, Google and some phone carriers are pushing out a security fix to address this vulnerability. Source: http://www.zdnet.com/article/after-stagefright-samsung-and-lg-join-google-with-monthly-android-patches/ What is
It doesn’t matter if you’ve trained them or yelled at them or had to fix their infected computers in front of them (or all of
We field questions about Java security issues on a regular basis, and have noticed that users are often confused about the differences between Java and
Even though you CAN buy it, you need to ask yourself if you really SHOULD you buy that Internet-connected appliance…….. Very few people would seriously