How to make sure your data doesn’t crash and burn

The dangers of public Wi-Fi are already well known, but the security issues of in-flight Internet connection are still somewhat obscure. Typically there’s no password protection on the Wi-Fi connection, so persons with malicious intent can intercept data that’s being transmitted on the wireless network quite easily. Airplanes are unique hacking grounds more dangerous than…

GDPR Compliance Regulations: The New Challenge for the Cloud Operations Manager

In December 2015, the European Union (EU) announced a framework designed to combine the various data protection laws throughout the region. The General Data Privacy Regulation (GDPR) impacts many industries, from coffee shops to football clubs. It essentially affects any institution that retains personal information, especially businesses that store or handle data in multiple countries….

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards. With a new…

Millions of User Accounts Allegedly Stolen From Dailymotion

Data breach notification service LeakedSource has obtained a database containing the details of roughly 85 million Dailymotion users, including usernames, email addresses and, in many cases, passwords. According to LeakedSource, the database stores 87 million records with 85 million unique email addresses. More than 18 million of the entries also include password hashes. LeakedSource said…

The Threat Model of 2017

The threat model is one of the most basic tools IT professionals use to analyze security incidents and scenarios. It is the first stop along the security path where potential hazards can be identified and quantified. Threat models involve judgments about which threats are important to a particular situation. An automated tool that simply lists…

Protecting smart hospitals: A few recommendations

The European Union Agency for Network and Information Security (ENISA) has released a new report to help IT and security officers of healthcare organizations implement IoT devices securely and protect smart hospitals from a variety of threats. We all know that attacks against hospitals are increasing, but according to security experts, ransomware and DDoS attacks…

Protect Sensitive Files With Document Security Management

When it comes to data security, documents matter. Most organizations have invested in tools that enable them to securely manage their sensitive documents. They are struggling, however, to compel employees to use these tools consistently and correctly. Throughout the IT industry, actual document management and security practices fall seriously short. Malware-infected files frequently penetrate networks…