The problem is not with the employees or IT itself. It’s with the CEO and Board of Directors who are not aware of risks and the solutions that can minimize consequences in the cyber security space.
IT Security Threats
A distinction has to be made when it comes to how far perimeter security products go toward overall IT security. All they really do is keep out noise. In other words, perimeter security only prevents the low-skilled attacks looking for easy targets.
If you’re like me, by now you’ve most likely received quite a few phishing emails from supposedly prospective customers that are almost comical in their ineptness. Unfortunately though, if criminals didn’t have at least some success using these tactics we wouldn’t still be seeing them – and watching them evolve into more complex and sophisticated forms.
While some might argue that ignorance is bliss, when an organization’s IT security hangs in the balance, remaining clueless isn’t a viable option. In this guest post, Jane Grafton of Lieberman Software describes five common IT security myths. All too often people hide behind what they ‘want’ to believe is…
The scareware infection methodology is very dangerous and starts when you click legitimate-looking web page results from major search engines like Google and Bing (yes, they index infected sites).
There are reports that one of Australia’s largest universities, the University of Monash near Melbourne, has been hacked by Iranian nationalists. This incident demonstrates the changing face of hacker attacks. For some time the IT security industry has geared up to prevent cyberattacks by organized criminals. As a result, most…
As you access a website you can pass a surprising amount of information to its remote servers. The website operators know your ISP, your IP address (either the unique address of your computer or the home router in front of it), and as a result your approximate geographic location.
Can you identify the significant common factor in these attention-grabbing headlines? Thousands of secret diplomatic communications are stolen from the US government and posted onto WikiLeaks. A powerful computer worm (dubbed “Stuxnet”) invades isolated computer networks to wreak havoc with physical machinery that drives a foreign government’s nuclear programs. The…
Cyber terrorism continues to bubble below the surface, with no large-scale effort to squash it, because there hasn’t yet been a major, defining attack.
My opinion is that ISPs should be provided with a safe-harbor exception from liability so that they can provide so-called “clean pipes” to Internet peer points. In effect, the ISPs should be able to monitor the traffic on their network for botnets and other hostile activity and disconnect these systems as a matter of daily business activity.