This week in InfoSec – TalkTalk, 2$ Security & Contactless Card Theft
By in Information Security, on October 26, 2015 at 9:54 am
This week in InfoSec – TalkTalk, 2$ Security & Contactless Card Theft

If nothing else, this week’s news has taught us the importance of having an incident response plan in place and reminded us that we are individually all targets for criminals. But it’s not all doom and gloom, as demonstrated by an enterprising 11-year-old who has made secure passwords her business.

US & EU businesses weather privacy storm, hope for Safe Harbour reincarnation
By in VPN & Privacy, on October 20, 2015 at 4:58 pm
US & EU businesses weather privacy storm, hope for Safe Harbour reincarnation

For economic reasons above all else, Safe Harbour is likely to make a comeback, though possibly under a different name. The EU could force the hand of the United States to draw back its mass surveillance programs, succeeding on the behalf of businesses where the interests of individuals failed.

Why Dell isn’t dead: the cloud is a storage location, not a storage medium
By in Cloud and Online Backup, on October 15, 2015 at 7:21 pm
Why Dell isn’t dead: the cloud is a storage location, not a storage medium

Why Dell, EMC, and other legacy enterprise hardware players won’t be put out of business by the cloud. A comeback is just a patent or acquisition away.

How to deal with revenge porn
By in Information Security, on October 15, 2015 at 9:09 am
How to deal with revenge porn

Has someone taken explicit video footage or still images of you and posted it on the internet? If they have, I really feel for you; it’s a horrific, damaging crime. But there is some help out there in the form of the law and specialised support groups run by people just like you.

Downtime during disaster recovery could kill your business. It’s time to upgrade
By in Cloud and Online Backup, on October 8, 2015 at 3:18 am
Downtime during disaster recovery could kill your business. It’s time to upgrade

If a recovery consists of over 100 terabytes of data, it could take days or even over a week to get up and running again. Pre-recovery solves that.

Smartphones and government surveillance – where privacy and security collide
By in VPN & Privacy, on October 7, 2015 at 8:52 pm
Smartphones and government surveillance – where privacy and security collide

When I was growing up The Smurfs were cute cartoon characters and petrol station collectibles. In 2015 they’re something far more sinister – a collection of tools used by the security services to compromise smartphones and the people who own them.

Outcry from online businesses as EU court threatens to suspend Safe Harbour with US
By in Cloud and Online Backup, on September 29, 2015 at 5:13 pm
Outcry from online businesses as EU court threatens to suspend Safe Harbour with US

CJEU Advocate General Yves Bot says the European Commission’s decision granting Safe Harbour status to the US should be suspended in the wake of Snowden.

What is social engineering and how can you avoid it?
By in Information Security, on September 15, 2015 at 11:19 am
What is social engineering and how can you avoid it?

Fool me once… hang on, have I just been socially engineered? It’s not only machines that can be hacked – humans can also be duped by malicious actors who leverage their knowledge of psychology to trick, deceive or otherwise bamboozle their way past security’s weakest link.

What are the risks of mobile banking?
By in Information Security, on September 15, 2015 at 10:59 am
What are the risks of mobile banking?

Do you have money in your bank account? If so, you may wish to keep it there. Read this article to find out how the convenience of online banking could deprive you of your hard-earned cash and learn what you can do to eliminate the risks.

Page 47 of 47