Adobe and Microsoft each pushed out security updates for their products today. Adobe plugged at least seven security holes in its Flash Player software. Microsoft, which delayed last month’s Patch Tuesday until today, issued an unusually large number of update bundles (18) to fix dozens of flaws in Windows and associated software.
Ransomware is a form of malware that criminals find a way to install on our systems. What “ransomware” does is encrypt the data on a hard drive and make it unavailable until you pay a fee (ransom). The ransom pays for a the key to decrypt the data. Ransomware is like many other forms of malware and usually makes […]
A primary goal of Access Control is to prevent loss, be it losses of confidentiality, information integrity or information availability. It goes without saying that in order to protect your assets and information, you must explicitly control who and what has access. (And sometimes when, where and how.) Ideally, Access Control is well defined as […]
For this months topic we will be discussing mobile security risks and preemptive measures to take in order to reduce the risks. Mobile devices are commonly used in remote locations (away from the office) which imposes many risks which need to be mitigated before sensitive/private data is stored or accessed. Mobile devices allow workers to […]
If you follow the news, you may have seen that Hyatt discovered a breach last year, and disclosed the extent of it as they understand it. Data breaches are a fact of life, and folks too often wait for something to happen before they address systemic issues in their organization. Security is a cost center, not […]
Happy New Year! This is the first in a series of monthly information security awareness posts to help our clients stay ahead of security problems by informing their employees of common security best practices, recent trends and threats, and advice of what to do if the bad guys get you! This month, Passwords. Nobody likes […]