BY JOSHUA WOOD, OCTOBER 11, 2017
SECURITY

IT Security: The door you didn’t know was open

As an IT security professional with many years in the business, I can’t remember a time when IT security has been as crucial to the success and survival of businesses. No matter how good a business thinks its IT security is, the bad guys have figured out how to pick the locks. According to Bob Martin from CISCO Systems, “With breaches at more than 13 retailers and a number of unknown breaches that were never  …>> more
BY HARRY ZAREK, JANUARY 17, 2017
CLOUD COMPUTING, SECURITY

Empower users or protect assets? We shouldn’t have to choose.

Business operates in a digital world where we spend a significant part of our day connected and interacting with people, applications and information both inside and outside our organisation. For our internal IT environment, we manage access to applications and data in a formal way. But when our staff go out to the internet, we can’t restrict where they go. We have an “honour principle” that they will go only to business relevant sites. But  …>> more
BY JOE ADDISON, APRIL 8, 2014
SECURITY

5 things to do if you’re still running Windows XP

If all goes according to plan, today will be the last Patch Tuesday for Windows XP and Office 2003. And while rumours still abound that Microsoft will back down and offer a low cost support option, I’m not holding my breath. However, there are still some legitimate reasons why you may still have Windows XP running in your environment. There may be a critical application that won’t run on anything other than XP and the  …>> more

Healthcare security isn’t a sexy topic, but we need to talk about it

In a healthcare setting, there’s no doubt that security matters because hospitals deal with sensitive patient data. The only time we hear about data security in healthcare is when something goes wrong, like when there’s a data breach and personal information is accidentally (or maliciously) released into the wild. Security expert Chris Poulin has calculated that more that 24 million electronic patient health records have been compromised between 2009 and 2013, with a significant amount  …>> more

Social engineering: network security’s weakest point

Recent news about the NSA accessing personal information, and allegations of Canadian officials spying on their Brazilian counterparts, has brought surveillance and security issues to the public eye once again. Because network security is one of my areas of specialization, people often come to me when topics such as these ones make the headlines. Everybody is quick to scrutinize the technology – what was wrong with the technical solution, the architect or the network. However,  …>> more
BY DON ANDERSON, AUGUST 7, 2013
MANAGEMENT, SECURITY

PRISM revelations mean we have less privacy than we thought

Recent headlines about the scope of government snooping on telecommunications activities in the United States have prompted reactions ranging from outrage on the negative side to affirmation or resignation on the positive side. It seems that most of us have less privacy than we thought. Privacy: More Than Just Confidentiality Privacy is related to confidentiality, one of the cornerstones of information security (along with integrity and availability). But privacy and confidentiality are different: privacy relates  …>> more