BY HARRY ZAREK, JANUARY 17, 2017
CLOUD COMPUTING, SECURITY

Empower users or protect assets? We shouldn’t have to choose.

Business operates in a digital world where we spend a significant part of our day connected and interacting with people, applications and information both inside and outside our organisation. For our internal IT environment, we manage access to applications and data in a formal way. But when our staff go out to the internet, we can’t restrict where they go. We have an “honour principle” that they will go only to business relevant sites. But  …>> more
BY JOE ADDISON, APRIL 8, 2014
SECURITY

5 things to do if you’re still running Windows XP

If all goes according to plan, today will be the last Patch Tuesday for Windows XP and Office 2003. And while rumours still abound that Microsoft will back down and offer a low cost support option, I’m not holding my breath. However, there are still some legitimate reasons why you may still have Windows XP running in your environment. There may be a critical application that won’t run on anything other than XP and the  …>> more

Healthcare security isn’t a sexy topic, but we need to talk about it

In a healthcare setting, there’s no doubt that security matters because hospitals deal with sensitive patient data. The only time we hear about data security in healthcare is when something goes wrong, like when there’s a data breach and personal information is accidentally (or maliciously) released into the wild. Security expert Chris Poulin has calculated that more that 24 million electronic patient health records have been compromised between 2009 and 2013, with a significant amount  …>> more

Social engineering: network security’s weakest point

Recent news about the NSA accessing personal information, and allegations of Canadian officials spying on their Brazilian counterparts, has brought surveillance and security issues to the public eye once again. Because network security is one of my areas of specialization, people often come to me when topics such as these ones make the headlines. Everybody is quick to scrutinize the technology – what was wrong with the technical solution, the architect or the network. However,  …>> more
BY DON ANDERSON, AUGUST 7, 2013
MANAGEMENT, SECURITY

PRISM revelations mean we have less privacy than we thought

Recent headlines about the scope of government snooping on telecommunications activities in the United States have prompted reactions ranging from outrage on the negative side to affirmation or resignation on the positive side. It seems that most of us have less privacy than we thought. Privacy: More Than Just Confidentiality Privacy is related to confidentiality, one of the cornerstones of information security (along with integrity and availability). But privacy and confidentiality are different: privacy relates  …>> more
BY RANDY MANDRISH, JULY 29, 2013
SECURITY

‘Lost’ smartphones experiment reveals that most people are snoops

Have you ever thought about what might happen if you left your smartphone behind? People are naturally curious, but when a lost mobile device is discovered, curiosity can lead to the violation of personal privacy and the exposure of sensitive personal information. To put this idea to the test, Symantec performed an experiment to see what would happen if they “lost” 50 smartphones in public areas. How many people would try to tamper with the phones  …>> more