Information Security

26 articles
Annual Cybersecurity Update

Annual Cybersecurity Update

Another Year of What Seems Like So Much Cyberwocky One more 365, come and gone. Our hyperconnected lives keep us always on the lookout for the next update, the hottest feature, the latest trends for the new year. But then that's also just how we're wired. Yet while we love to leap ahead, a look back can be beneficial too—good,…

Zn Dy feature logowhaling attack: Not your momma’s attempt at lesson teaching, this maritime-inspired techie homophone will catch decision-makers by the worst surprise. Targeting C-suite and high-level end users, sneaky cybercriminals use carefully crafted emails to reel in a company’s “big phish,” gaining insider access to company jewels. An offshoot of the well-known “phishing” attack, whaling is insidious and calculated deceit, with the end goal of exploiting business leaders’ personal devices. And unless execs know what to look for, they can easily be duped. This is no casual spam scam—attackers research correct titles, company information, even personal details in an effort to sound legit. Social media can play a huge part in the harvest, and along with being judicious in detail sharing, experts recommend quizzes and social pen-testing to expose vulnerabilities. Those in the know also predict that in the coming year, execs will need to be ever more vigilant if they hope to evade the hunters. Sounds like it’s time to drop anchor and chart a new course—toward protection.

Want more? Subscribe.

012716
Data Privacy Day 2016: <br>#PrivacyAware Is Where I.T.’s At

Data Privacy Day 2016:
#PrivacyAware Is Where I.T.’s At

In today's hyper-connected digital landscape, privacy is hard to come by. Really, that should make us value it all the more. And while in the business world this is especially true, that's just one piece of the ever-expanding cybersecurity puzzle. The National Cyber Security Alliance has long known that "Respecting Privacy, Safeguarding Data and Enabling Trust" is our collective responsibility—it's…
National Cyber Security Awareness Month 2015

National Cyber Security Awareness Month 2015

Another year has come and gone; those 365 days move faster than ever. Today’s rapid time movement is reminiscent of the constant advances in technology, and how those changes beget shifts in cyber awareness—it’s hard to keep up! ‘New’ is often synonymous with ‘vulnerable,’ and staying on top of the latest—be it news, updates, or training—can be a tall order.…

Zn Dy feature logosilo:Ironically versatile, this jargon-y noun/verb/adjective hurts both sides of the IT/C-suite aisle. Like its agricultural namesake, a corporate ‘silo’ siphons data top-to-bottom, squashing lateral, inter-departmental teamwork. The enemy of a communicative, goal-oriented culture, a ‘silo mentality’ starves efficiency and collaboration, kills productivity. ‘Siloing’ is worse yet in a cyber security context: data held hostage, threat prevention undermined, defenses break down. The dangers are obvious, and business leaders are moving to steer clear. So let’s encourage progress—get those silos gone and let ideas flow free.

Want more? Subscribe.

090915
Opposites Distract: Successfully Confronting the IT / C-Suite Struggle

Opposites Distract: Successfully Confronting the IT / C-Suite Struggle

For today's business, things have reached critical mass. Not only are we seeing data breaches at every turn, but we're also finding fractured camps at their root—'civil war' within an already raging 'cyber war.' If this sounds familiar, take heart—big problems, both real and perceived, can be worked through and neutralized. It comes down to communication, to going beyond department…

Zn Dy feature logozombie: Just as deadly as its cannibalistic sound-alike, infinitely sneakier. A compromised link in an infected chain of computers, a zombie loves to share the filth. Taking direction from a remote ‘bot master’ with an evil agenda, a group of zombies carry out malicious tasks undetected. Computer owners are often totally unaware as information is surreptitiously harvested, viruses multiply, and the zombie wave grows. Stop the spread: Diligently update software and antivirus programs, always pre-scan thumb drives, and learn to love your firewall. Keep making smart cyber choices. Help stop the apocalypse.

Want more? Subscribe.

012815
Offensive Cyber Defense

Offensive Cyber Defense

It's More than Just Crude Security As we round January’s corner into the new year, there’s so much to think about, from ambitious goals and adventurous plans, to lingering concerns. One thing’s for sure, with a slew of unprecedented data breaches, 2014 did what it could to keep cybersecurity on the brain. So whether it’s still taxing our nerves, or…
Data Privacy Day 2015

Data Privacy Day 2015

In a hyper-connected world, privacy is hard to come by. And that makes us value it all the more. In the business world, this is especially true. We aren't exaggerating when we say, "Privacy is good for business." The National Cyber Security Alliance has long known that "protecting privacy, safeguarding data and enabling trust" is our collective responsibility. So this…
National Cyber Security Awareness Month 2014

National Cyber Security Awareness Month 2014

Week 4: Cybersecurity for Small and Medium-Sized Businesses and Entrepreneurs Small and medium-sized business owners and entrepreneurs are invaluable to our economy, and to the nation as a whole. So it stands to reason that this 11th annual National Cyber Security Awareness Month has dedicated a week (October 20-24) to our hardworking colleagues and the unique challenges they face. Oftentimes,…