IT Security Threats



Combatting Business Identity Fraud

If you’re like me, by now you’ve most likely received quite a few phishing emails from supposedly prospective customers that are almost comical in their ineptness. Unfortunately though, if criminals didn’t have at least some success using these tactics we wouldn’t still be seeing them – and watching them evolve into more complex and sophisticated forms.






The IT Threat On (or Under) Your Desk

Can you identify the significant common factor in these attention-grabbing headlines? Thousands of secret diplomatic communications are stolen from the US government and posted onto WikiLeaks. A powerful computer worm (dubbed “Stuxnet”) invades isolated computer networks to wreak havoc with physical machinery that drives a foreign government’s nuclear programs. The…



Majority of Americans Support Internet Kill Switch

Majority of Americans Support Internet Kill Switch

My opinion is that ISPs should be provided with a safe-harbor exception from liability so that they can provide so-called “clean pipes” to Internet peer points. In effect, the ISPs should be able to monitor the traffic on their network for botnets and other hostile activity and disconnect these systems as a matter of daily business activity.