23 November 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

10 tips to Secure Passwords

20 November 2014  |  766 views  |  0  |  Recommends 0

Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remember and sentimental to use, this approach makes a hacker’s job all too easy. Here are 10 things you should know about passwords. Never use the sam...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Hackers and Banks win, Clients lose

12 November 2014  |  1296 views  |  0  |  Recommends 0

Don’t blame the hackers; don’t blame the bank; apparently it’s the victim’s fault that a Missouri escrow firm was robbed of $440,000 in a cybercrime, says a report on computerworld.com. The attack occurred in 2010, but the appeals court’s March 2013 ruling declared that the firm, Choice Escrow and Title LLC, can’t hold its bank accountable. The ...

TagsSecurity
More blog posts
Jean-Claude BellandoAxway - Paris

Making IT work in a merger and acquisition environment

11 November 2014  |  1821 views  |  0  |  Recommends 0

In a single move, mergers and acquisitions can provide businesses with a tremendous tool for increasing growth, profitability and improving strategic capabilities. M&As are gathering speed and las...

TagsSecurityRisk & regulation
Máté EizenbergerMisys - Budapest

Is 'good-enough' security good enough for Mobile Banking?

11 November 2014  |  3598 views  |  3  |  Recommends 1

CEB TowerGroup predicts mobile banking usage will reach 17 billion transactions in 2015. At the same time, customers are still worried about security, which is the number one fear among potential mo...

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

Security is Everyone’s responsibility

08 November 2014  |  949 views  |  0  |  Recommends 0

In the movies, the good guys always get the bad guys. In cyber reality, no such thing exists. A survey of 5,000 IT security professionals turns up the following: 63% doubt they can stop data breac...

TagsSecurity
Stephen MidgleyAbsolute Software - Vancouver

Working with your CIO to negotiate GRC - Part Two

07 November 2014  |  1659 views  |  0  |  Recommends 0

In part one of this blog series, I explained that firms need to take a holistic three stage approach to ensure data is kept secure, and therefore comply with data protection regulation and avoid fines...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Expect all Free Mobile Apps to leak your Data

04 November 2014  |  1274 views  |  0  |  Recommends 0

Mashable.com says that recently over 98,000 photos have been leaked from Snapsaved.com, which has shut down. The Snapchat app makers won’t take any credit, even though previously, 4.7 million phone nu...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Steps to Manage a secure online backup

29 October 2014  |  991 views  |  0  |  Recommends 0

Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should...

TagsSecurity
Chris SullivanCourion - London

Can cyber criminals spark the next financial crisis?

29 October 2014  |  2190 views  |  0  |  Recommends 0

Earlier this month Mark Boleat, head of policy for the City of London, gave a serious warning to the financial services industry as he prepared to address the Institute of International Finance in Was...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

5 ways Criminals hack your PC

25 October 2014  |  1225 views  |  0  |  Recommends 0

Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WI...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,306
Active bloggers
24,806
Members
8,259
Posts
11,527
Comments

Top security posts in last 5 days

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Máté Eizenberger

As a Mobile Product Manager I'm responsi...

Chris Sullivan

As Vice President of Advanced Solutions,...

Who is commenting on Security posts

Bjorn Soland
Dean Wallace
Máté Eizenberger
Ketharaman Swaminathan
Stephen Brown
Pat Carroll
Melvin Haskins
Otmane EL RHAZI