Business Continuity

Business Continuity news, information, and how-to advice

dell e2414hr 24 inch monitor 500x700
handshake

tech catastrophes

Tech apocalypse! 9 doomsday scenarios

Far-reaching fallout awaits us at the littlest hack or glitch, thanks to our increasing reliance on hyperadvanced computing and vast communication networks

godaddy license
Special Report

GoDaddy accounts vulnerable to social engineering and Photoshop

GoDaddy serves more than 13 million customers, who in turn place 59 million domains under the registrar's management. On Tuesday, my personal account at GoDaddy was compromised. The attacker was able to gain control over my account...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Premera, Anthem data breaches linked by similar hacking tactics

Security analysts last year saw a fake domain spoofing Premera's name

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Premera Blue Cross says data breach may affect 11 million customers

As many as 11 million customers may have been affected by a data breach at U.S. health insurance provider Premera Blue Cross, in the second large attack against the health care industry disclosed in the last two months.

samsung galaxy tab s

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

BlackBerry is returning to the tablet market -- this time with the help of Samsung Electronics, IBM and Secusmart, the German encryption specialist BlackBerry bought last year.

looking at watch

Microsoft patches broken Stuxnet fix, nearly five years later

On Tuesday, most of the public was focused on Microsoft's patches for the FREAK vulnerability. However, Redmond also pushed a fix that addresses a problem with a patch released in 2010, which left users exposed to one of the core...

dropbox android

Dropbox patches Android SDK vulnerability

Dropbox has released an update to their Android Core and Sync/Datastore SDKs, after researchers at IBM discovered a vulnerability that would enable an attacker to connect applications to a Dropbox account under their control.

Detail view of organized medical files    87333166

Anthem accused of avoiding further embarrassment by refusing audit

Anthem Inc., the nation's second largest health insurer, has refused a request for an IT Security audit citing corporate policy. This is the second time the organization has refused an audit request from the Office of Personnel...

google map location pin

Geofencing could add security layer for mobile devices

Geofencing technology -- tracking the location of a mobile device -- could offer an extra layer of security for enterprises trying to manage both company-owned and employee-owned devices. However, the technology can also raise worries...

apple pay

Crooks targeting call centers to further Apple Pay fraud

According to mobile payments expert, Cherian Abraham, fraud on Apple's mobile payment platform – Apple Pay – is rampant. However, Apple's hardware and software security measures remain intact; the issue at the heart of most fraud...

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem: 78.8 million affected, FBI close to naming suspect

On Tuesday, Anthem, the nation's second largest health insurer, said that 8.8 to 18.8 million people who were not customers could be impacted by their recent data breach, which at last count is presumed to affect some 78.8 million...

cso50

Security offers a marketing advantage for ADP

ADP's award-winning payroll vendor management system helps the company serve more international markets and clients than ever before and is, in fact, doing it so well that its managers are routinely asked to sit in on sales meetings...

If you could go back in time...

Turning back the clockImage by ShutterstockEvery week brings news of breaches, cybercrime and state-sponsored hacks, each more shocking than the last.Unfortunately, it's not practical to rip up the whole Internet and start over again...

disaster recovery button keyboard

When backup Is a disaster

Utility Company AMP overhauls a mishmash of backup and recovery procedures to create one coherent plan.

heatlhcare doctor

After the Anthem breach: How we can help secure health data

The Anthem breach may have seemed a baffling or inexcusable security lapse. But once you understand what’s going on in healthcare security and technology right now, you can see why this was inevitable and how we can help prevent such...

Lenovo Y50 gaming laptop

Lenovo says Superfish problems are theoretical, but that simply isn't the case

On Thursday, the world woke to the news that commercial-grade Lenovo PCs were being shipped from the factory with adware pre-installed on the system. Designed to provide a visual shopping experience, the software is insecure and...

Lenovo Y40 Gaming PC

FAQ: How to find and remove Superfish from your Lenovo laptop

Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and information theft. Here’s how to determine...

intro

10 obscure technologies that could change the world

Technology breakthroughs that many people don't even know exist.

Load More