Stupid people and data security Why we can't totally trust people with information security

Simple PIN codePeople are stupid!

Before you click away, let me tell you a story… [Read more…]

Protect your business from Ransomware 8 things you can do to protect yourself

Mobbing and stress at workDo viruses and other malware scare you?

I recently was called in by a non-profit saying that there was an issue with their file server, and they suspected malicious intent by somebody on the inside.

After a short investigation, I found the issue was the CryptoLocker ransomware. The malware encrypted all the files in the servers, which were shared via mapped drives. [Read more…]

Improve the outcomes of your IT projects by using a design and implementation methodology

TeamworkIT projects suffer a great deal of failure. Statistics from the Standish Group’s 2009 CHAOS report put the success rate of IT projects at about 30%. This means that 70% of IT projects fail to complete on-time and within budget as well as to achieve the planned objectives; some may not even complete at all. [Read more…]

The Heartbleed Bug: What is it and what to do about it Don't let it ruin your day

heartbleedThere is a serious bug out there that can compromise your data and you probably wouldn’t know it. [Read more…]

Should you outsource your IT Security? There may be advantages to be had after all!

Outsource vs inhouseThere is a growing trend in businesses to outsource their IT Security to Managed Security Service Providers (MSSP). I’ll be upfront and state that I was not a big fan of this, as I believed that IT security is too important to pass off to a 3rd party, especially with the financial institutions who I mainly work with. But there is a growing body of research that finds that there are some areas where it may be worthwhile considering outsourcing. [Read more…]

Have You Ever Had a Data Breach? Think hard before you answer that question.

Breach“Have you ever had a data security breach?”

Whenever I ask prospects this question and they tell me, “No!” – and most prospects do say no – I laugh heartily… in my head of course.

Breaches have now become an almost inevitable part of data networks. You can’t prove a negative, so you can’t say that you’ve never been breached, but that you’ve never discovered one… yet. Or perhaps they have conveniently defined what a data security breach is so that they don’t have to call a breach as one. [Read more…]

The Evolution of the Firewall How firewalls are changing to fight against new threats

Robot EvolutionThe network firewall was once the pillar of your data network security, protecting you from the evils of the outside world. It no longer seems as sexy.

A friend of mine recently quipped, “Do people still depend on firewalls for security?” I think he was alluding to the idea that the firewall plays a far lesser role in protecting your network as it once did. But it still does play a role. [Read more…]

Humans are the Weakest Links in IT Security And you should not take them for granted!

IT SecurityMany businesses and enterprises focus on protecting their networks and data from external IT security threats, with little focus on internal threats, opting to ‘trust’ the internal users. However, your employees can be more dangerous to your data, and cause the most data breaches. [Read more…]

Cisco to Acquire Sourcefire, the Makers of Open Source Snort and Clam AV for $2.7B Hopes to Bolster Security Strategy

cisco-logoCisco Systems today announced an agreement to purchase Sourcefire, the makers of the open source intrusion detection/protection system, Snort, and anti-virus, Clam AV. The deal is reported to be worth about US$2.7 billion in cash. [Read more…]

Is Your Data Security Technology a Moral Hazard? How more may be less!

Risky BehaviourCan technology make you less safe from cyber-threats?

I mentioned before that too much technology can be detrimental to your information security goals. In the insurance industry, there is something called moral hazard. Moral hazard is where an insured person takes more risks because the potential costs of such risks are taken care of by another party. [Read more…]