Business Continuity

Business Continuity news, information, and how-to advice

steel chain with broken link close up 55909938

Security must evolve to be ‘all about the data’

Experts on panel discussion sponsored by Dell agree that the current security model is obsolete, and that to face the expanding and evolving threat landscape will require embedding data itself with smart security protection


Are you prepared to address the security impact of aging coders on key systems?

Recognizing the impact of aging coders on the security of key systems is not yet a priority. Which is precisely why it’s important. Here are some considerations.

goodwill industries thrift shop canton michigan

A possible breach at Goodwill is bad, but nothing special

Last week, Goodwill Industries International was alerted by federal authorities to a possible payment card breach at several of their U.S. locations. Reaction to this news has been typical for the most part, as they're yet another...

stack of documents

Study examines the problems with metadata and file sharing

A study by Workshare, a company focused on secure file sharing applications, says that 68 percent of the 800 professionals surveyed failed to remove metadata before sharing documents. Due to this oversight, potentially sensitive...

knowledge is power 149148084

Misconceptions about targeted attacks

Trend Micro's Spencer Hsieh published a blog recently that caught my attention. It's focused on misconceptions surrounding targeted attacks. It's an interesting read, which I thought was worth sharing on Salted Hash.

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

credit card processing

Cybersecurity fears drive SMBs to third-party payment services

High-profile breaches highlight the need for secure credit card processing.

Want credit for June's Exchange blackout? File a claim

Affected Office 365 and Exchange Online customers may be eligible for 25 percent service credit

internet gavel keyboard

Takedown of No-IP by Microsoft impacts 1.8M customers

New details have emerged in the aftermath of Microsoft's actions against Vitalwerks - the company that operates No-IP (noip.com). At current count, 1,832,133 customers were impacted by Microsoft's takedown of No-IP, which directly...

internet gavel keyboard

Microsoft's takedown of No-IP pushes innocents into the crossfire

On Monday, Microsoft said they were taking No-IP (noip.com) to task for failing to prevent criminals from abusing their services. The case is Microsoft's latest effort to slow the spread of malware online, but this time innocents are...

butlerbulldog

Butler University data breach impacts 163,000

Indianapolis-based Butler University has warned more than 160,000 students, alumni, faculty, staff, and past applicants that their personal information was exposed during a data breach in 2013.

NCC Group's new '.trust' domain promises Internet security overhaul

Designed to make phishing and other abuses harder

hotelkeycard

Hotel Security: Navigating concerns and identifying solutions

Business and recreational travelers demand safe and secure hotel accommodations, as well as responsive and friendly customer service. How can hoteliers ensure both expectations are met?

cloud security

How to avoid having your cloud-hosted business destroyed by hackers

The demise of Code Spaces, a code-hosting service that had its customer data deleted by extortionists, is an example of the dire consequences from inadequate cloud security.

If you lose your key staff, are you prepared to maintain security?

Leaders need to assess and prepare for the security impact of key people leaving the organization while making it better for those who stay.

binary hard drive

Code Spaces forced to close its doors after security incident

Code Spaces, a SVN and Git hosting provider, used by organizations for project management and development needs, has folded after an attacker compromised their internal systems.

Six ways to prevent a breach like the one at AT&T

A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

Security concerns slow bank adoption of cloud and mobile

Fujitsu report shows many banks running scared of next gen technology

Syrian Electronic Army

Follow-up: Syrian Electronic Army responds to attack article

Earlier this week, Salted Hash published a first-hand account of an attack by the Syrian Electronic Army (SEA) against IDG. Later that same day, one of the group's members responded.

Load More