Social networking sites like Facebook are great tools for connecting with friends and keeping up-to-date with the good and bad things that are going on in your social circles. Unfortunately, the kind and amount of personal information that makes for great social networking can be used by people with bad intentions to cause real, physical harm. Sound far-fetched? After a referee made a controversial call in a baseball game, someone with his same name received threats meant for the ref. Today’s security awareness tip is about profile management: developing habits that help you to stay in control of the information that’s available about you online, to keep you safe in the real world.
For Cyber Security Awareness Month I’d like to address patching; more specifically, verifying patches in your environment. Patching is a big part of any security policy. It’s also very important to verify that the patches and updates deployed have actually been installed. Whether you have one host or thousands, using a tool to scan your environment to verify those patches can save a lot of time and serve as a check on your patch processes.
There are some very good vulnerability scanners out there that can help locate and identify vulnerabilities and missing patches, but many are complex and expensive. I’d like to talk about two free and simple tools you can use to check that systems in your environments have secure configurations and are running up-to-date software.
Read More »
Web-based threats have never been higher and are expected to keep growing. Remember the days when viruses were spread via floppy disks, then email, then USB flash drives, and then instant messenger applications? While most of those risks still exist today, they are overshadowed by the enormous risk that casual web browsing has become. Some of the most common threats include technical problems like “cross-site scripting” and “cross-site request forgery” that cause browsers to behave in unexpected ways, often without any indication of a problem. “Phishing” and silent unintended downloads called “drive-by downloads” are also serious threats that can leave an unsuspecting user with malware that steals banking and personal information.
It’s also true that many of us have multiple web browsers installed on our computers. If not, they are easy to install. The most common choices seem to be Internet Explorer, Firefox, Safari, Chrome, and Opera. We can take advantage of this fact to create a very simple but effective security advantage.
Securing a large complicated network can be a daunting task with so many technologies and devices. You may be asking yourself where to start. What could I do to get the most out of the time I spend securing my network? There are three areas that you can start with that will significantly reduce your attack surface and make your network more secure in the process. It is such a simple list yet overlooked by many: patching, maintain passwords, and disable unnecessary services.
Consumers today are highly attached to mobile technology and are using it as part of their daily lives and shopping experiences. According to Nielson forty percent of mobile consumers over 18 in the U.S. now have smartphones. As these users consume bandwidth to send and retrieve content from SMS, MMS, Email, and social media apps such as Facebook, YouTube and Twitter that supports pictures and videos, they are increasingly looking to Wi Fi to improve their experience.
Are retailers offer their shopping channels (including store, web, voice and social media) to consumers, the consumers are expecting to be able to use their mobile device across all the channels whereever they are, at home, at work, and IN YOUR STORE.
As a retailer, facilitating mobility in the retail store can differentiate you from the competition, plus help you meet the soaring expectations of your customers. On the other hand, allowing access to your wireless network poses potential risks. You’ve got to ensure the security of your data, comply with PCI mandates, prevent misuse and interference, and provide consistent bandwidth for your own operations.
For help retailers address this issue, we are hosting a webcast on October 20th 10:00am Pacific Time titled