Configuring the Windows firewall

Show of hands—How many of you have heard someone say something like this: “You don’t need an extra firewall. The one that comes with Windows is sufficient for home users”. While this may be true for the default settings when it comes to protection, how many who have heard this remark are able to check…

Cyber risk in advanced manufacturing: How to be secure and resilient

Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI). Study results indicate nearly 40 percent of surveyed manufacturing companies were affected by cyber incidents in the past 12 months, and 38 percent of…

How to protect your marketing team amidst security threats

Unfortunately, businesses have never been more exposed to threats of cyber-attacks than now. As more and more information is shared online, hackers are enhancing their efforts and targeting vulnerable businesses. The good news is that there are also more security solutions available than ever before. By implementing them in the appropriate manner, you can keep…

7 steps to start a bug bounty program

Vulnerability assessment and identification strategies have evolved to include the concept of crowd sourced security testing through bug bounty programs. While bug bounty programs have been used for over 20 years, widespread adoption by enterprise organizations has just begun to take off within the last few. The bug bounty path, paved by tech giants, is…

Securing Black Friday sales: Is your business ready?

Black Friday is the day following Thanksgiving Day in the US, well-known for a variety of promotional sales. These are dependent on Internet connections working, servers coping with demand, in-store bandwidth holding up for transaction processing, and more. Both in-store and online, Black Friday sales are dependent on technology.

Tip of the week: How to delete unwanted programs

Generally speaking, programs you don’t want — the bloatware that came with your computer or piggybacked on software updates, for example — often are not really dangerous. Nevertheless, they may be a drag in various ways, launching unwanted processes and slowing down your system, tracking your movements online and sending personal data to software developers….

How To Build A Strong Security Awareness Program

At the Security Awareness Summit this August in San Francisco, a video clip was shown that highlights the need to develop holistic security awareness. The segment showed an employee being interviewed as a subject matter expert in his office cubicle. Unfortunately, all his usernames and passwords were on sticky notes behind him, facing the camera…