Business Continuity

Business Continuity news, information, and how-to advice

Are you prepared to address the security impact of aging coders on key systems?

Recognizing the impact of aging coders on the security of key systems is not yet a priority. Which is precisely why it’s important. Here are some considerations.

Security must evolve to be ‘all about the data’

Experts on panel discussion sponsored by Dell agree that the current security model is obsolete, and that to face the expanding and evolving threat landscape will require embedding data itself with smart security protection


goodwill industries thrift shop canton michigan

A possible breach at Goodwill is bad, but nothing special

Last week, Goodwill Industries International was alerted by federal authorities to a possible payment card breach at several of their U.S. locations. Reaction to this news has been typical for the most part, as they're yet another...

knowledge is power 149148084

Misconceptions about targeted attacks

Trend Micro's Spencer Hsieh published a blog recently that caught my attention. It's focused on misconceptions surrounding targeted attacks. It's an interesting read, which I thought was worth sharing on Salted Hash.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

stack of documents

Study examines the problems with metadata and file sharing

A study by Workshare, a company focused on secure file sharing applications, says that 68 percent of the 800 professionals surveyed failed to remove metadata before sharing documents. Due to this oversight, potentially sensitive...

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

credit card processing

Cybersecurity fears drive SMBs to third-party payment services

High-profile breaches highlight the need for secure credit card processing.

Want credit for June's Exchange blackout? File a claim

Affected Office 365 and Exchange Online customers may be eligible for 25 percent service credit

Why Are Customers Really Deploying an NGFW?

It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final

internet gavel keyboard

Takedown of No-IP by Microsoft impacts 1.8M customers

New details have emerged in the aftermath of Microsoft's actions against Vitalwerks - the company that operates No-IP (noip.com). At current count, 1,832,133 customers were impacted by Microsoft's takedown of No-IP, which directly...

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP (noip.com) to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

butlerbulldog

Butler University data breach impacts 163,000

Indianapolis-based Butler University has warned more than 160,000 students, alumni, faculty, staff, and past applicants that their personal information was exposed during a data breach in 2013.

NCC Group's new '.trust' domain promises Internet security overhaul

Designed to make phishing and other abuses harder

5 Ways Dropbox for Business Keeps Your Data Protected

Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how we've built Dropbox for Business to keep data safe for all our users.

hotelkeycard

Hotel Security: Navigating concerns and identifying solutions

Business and recreational travelers demand safe and secure hotel accommodations, as well as responsive and friendly customer service. How can hoteliers ensure both expectations are met?

cloud security

How to avoid having your cloud-hosted business destroyed by hackers

The demise of Code Spaces, a code-hosting service that had its customer data deleted by extortionists, is an example of the dire consequences from inadequate cloud security.

If you lose your key staff, are you prepared to maintain security?

Leaders need to assess and prepare for the security impact of key people leaving the organization while making it better for those who stay.

binary hard drive

Code Spaces forced to close its doors after security incident

Code Spaces, a SVN and Git hosting provider, used by organizations for project management and development needs, has folded after an attacker compromised their internal systems.

What is this "File Sync" Thing and Why Should I Care About It?

All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no surprise that 55% of information workers in North America and Europe who use a tablet at work are using file sync and

Six ways to prevent a breach like the one at AT&T

A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

Security concerns slow bank adoption of cloud and mobile

Fujitsu report shows many banks running scared of next gen technology

Syrian Electronic Army

Follow-up: Syrian Electronic Army responds to attack article

Earlier this week, Salted Hash published a first-hand account of an attack by the Syrian Electronic Army (SEA) against IDG. Later that same day, one of the group's members responded.

Syrian Electronic Army

Inside an attack by the Syrian Electronic Army

The Syrian Electronic Army (SEA) has become a bit of a name brand as far as low-level hacking groups are concerned. Their methods are simple, but effective. They spend most of their energy on propaganda and self-promotion, but lately...

Load More