The problem is not with the employees or IT itself. It’s with the CEO and Board of Directors who are not aware of risks and the solutions that can minimize consequences in the cyber security space.
IT Security Threats
A distinction has to be made when it comes to how far perimeter security products go toward overall IT security. All they really do is keep out noise. In other words, perimeter security only prevents the low-skilled attacks looking for easy targets.
We’ll likely never eliminate all security threats, but with a sound, layered cyber security approach we can reduce their impact. And when it comes to mitigating the risks of negligent insiders, organizations need to move beyond basic IT security training and look for ways to limit the damage.
If you’re like me, by now you’ve most likely received quite a few phishing emails from supposedly prospective customers that are almost comical in their ineptness. Unfortunately though, if criminals didn’t have at least some success using these tactics we wouldn’t still be seeing them – and watching them evolve into more complex and sophisticated forms.
While some might argue that ignorance is bliss, when an organization’s IT security hangs in the balance, remaining clueless isn’t a viable option. In this guest post, Jane Grafton of Lieberman Software describes five common IT security myths. All too often people hide behind what they ‘want’ to believe is…
The scareware infection methodology is very dangerous and starts when you click legitimate-looking web page results from major search engines like Google and Bing (yes, they index infected sites).
There are reports that one of Australia’s largest universities, the University of Monash near Melbourne, has been hacked by Iranian nationalists. This incident demonstrates the changing face of hacker attacks. For some time the IT security industry has geared up to prevent cyberattacks by organized criminals. As a result, most…
As you access a website you can pass a surprising amount of information to its remote servers. The website operators know your ISP, your IP address (either the unique address of your computer or the home router in front of it), and as a result your approximate geographic location.
Can you identify the significant common factor in these attention-grabbing headlines? Thousands of secret diplomatic communications are stolen from the US government and posted onto WikiLeaks. A powerful computer worm (dubbed “Stuxnet”) invades isolated computer networks to wreak havoc with physical machinery that drives a foreign government’s nuclear programs. The…
Cyber terrorism continues to bubble below the surface, with no large-scale effort to squash it, because there hasn’t yet been a major, defining attack.