30 October 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

Steps to Manage a secure online backup

29 October 2014  |  443 views  |  0  |  Recommends 0

Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should just throw in the towel, as the saying goes, and figure “What’s the point?”. Here are some ways to beef up cloud storage security and manage your o...

TagsSecurity
Chris SullivanCourion - London

Can cyber criminals spark the next financial crisis?

29 October 2014  |  1041 views  |  0  |  Recommends 0

Earlier this month Mark Boleat, head of policy for the City of London, gave a serious warning to the financial services industry as he prepared to address the Institute of International Finance in Washington on the threat of cybercrime. His speech described a doomsday scenario in which cyber criminals would go about “destroying bank records and ...

TagsSecurityRisk & regulation
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

5 ways Criminals hack your PC

25 October 2014  |  1128 views  |  0  |  Recommends 0

Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WI...

TagsSecurity
Stephen BrownLANDESK - Utah

Should your organisation COPE with the COLD?

24 October 2014  |  1371 views  |  2  |  Recommends 0

We’ve heard the acronym BYOD (Bring Your Own Device) for some time now, but less about ‘COPE’ – Corporate Owned, Personally Enabled devices; tablets, smartphones and laptops which are owned by the ent...

TagsSecurityMobile & online
Stephen MidgleyAbsolute Software - Vancouver

Working with your CIO to negotiate GRC - Part One

23 October 2014  |  1321 views  |  0  |  Recommends 0

The increase in corporate mobile device use, fuelled by better technology and trends like Bring Your Own Device (BYOD) and enterprise focussed apps, means there are many more ways in which a business ...

TagsSecurity
Freddie McMahonAnomaly42 - London

Criminals exploit flawed correspondent banking

22 October 2014  |  1064 views  |  0  |  Recommends 0

Modern correspondent banking - the process where one international bank conducts business transactions and facilitates wire payment transactions on behalf of another bank - is one of the main facilita...

TagsSecurityTransaction banking
Robert SicilianoIDTheftSecurity.com - Boston

3 Stupid Simple Tips to protect your Identity

22 October 2014  |  769 views  |  0  |  Recommends 0

For anyone who goes online, it’s impossible to hack-proof yourself, but not impossible to make a hacker’s job extremely difficult. Here are three things to almost hack-proof yourself. Two-factor a...

TagsSecurity
Wendell BrockOutside Investment Advisors - McKinney

The New Cold War

21 October 2014  |  1040 views  |  0  |  Recommends 0

The Economic Cold War or Financial Cold War has begun slowly over the past several years and the current administration has added fuel to the fire. China and Russia both know it would be extremely dif...

TagsSecurity
Adam OldfieldUnisys - Leeds

Payments: Securing future innovation

17 October 2014  |  1451 views  |  0  |  Recommends 0

The only things that are certain in life are death and taxes, or so Benjamin Franklin’s infamous quote goes. In today's financial services market we can safely add another certainty - change. It seems...

TagsSecurityPayments
Robert SicilianoIDTheftSecurity.com - Boston

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  640 views  |  0  |  Recommends 0

Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineerin...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,312
Active bloggers
24,671
Members
8,190
Posts
11,422
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Pat Carroll

Throughout his career, Pat has been at t...

Stephen Brown

Stephen Brown leads LANDESK Software's m...

Who is commenting on Security posts

Ketharaman Swaminathan
Stephen Brown
Pat Carroll
Melvin Haskins
Otmane EL RHAZI
Ilja Ilit
Chris Torr