The Computer maker Acer’s U.S. webstore was breached for nearly a year, potentially exposing credit card data, names and mailing addresses of 34,500 customers. John Peterson, vice president of Enterprise Product Management at Comodo commented below. John Peterson, vice president of Enterprise Product Management at Comodo: 1. Practice Good Password Hygiene Create strong passwords using a hard-to-guess combination of uppercase and lowercase letters, numbers and symbols or special characters. Don’t use common names, dates, your pets’ or kids’ names, street addresses, birthday dates or other facts that attackers could easily find out about you on social media, public records or the Internet. Also, use separate passwords for each account,…
Author: ISBuzz Team
While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy, it also comes with risks that may not be apparent at first. Various products exist to allow you to access your computers remotely, including TeamViewer, GoToMyPC, AAA PC Remote Control Software and several others. If not setup properly and securely, many of these products can leave your PC open to external hackers or malware that could potentially get into your PC without your knowledge— and possibly steal your data or do damage to your…
Following the news that the T-Mobile insider stealing customer data to sell for a profit, Csaba Krasznay Product Manager at Balabit commented below. Csaba Krasznay, Product Manager at Balabit: “This is a warning sign for all companies. An employee with privileged access can cause huge problems, therefore their access control and activity monitoring is essential. Utilising User Behaviour Analytics can help prevent insider attacks in real-time. An interesting point in this case is that “the police initiated an investigation”. Usually, companies try to manage such incidents internally, given that if law enforcement become involved, digital evidences are needed, however, most companies…
The Culture, Media and Sport Committee has published its report Cyber Security: Protection of Personal Data Online . This inquiry was launched in October 2015 following the cyber-attack on TalkTalk’s website. The Committee looked at cyber-security and the response to cyber-crime and broader issues around data protection. Cyber security experts from ESET, Proofpoint, FireMon and Lieberman Software discuss the report. Mark James, Security Specialist at ESET: “The recommendations seem reasonable and certainly a good basis for starting. The fines currently imposed do seem quite insignificant for very large organisations that hold so much of our data and the ability to scale new…
The University of Greenwich has suffered its second data breach since February, The Evening Standard reports, after a disgruntled former student leaked 2.7GB of confidential student and staff data including email addresses and passwords, student grades, staff sickness and holiday details. The attacker also accessed the university’s web site, where they placed a link back to the database. Security experts commented on this news below. Luke Brown, VP and GM of EMEA, India and LatAm at Digital Guardian: “For organisations that handle sensitive data on a day-to-day basis, it’s easy to forget the consequences of a breach. When heavy fines are imposed and victims become…
Today Kaspersky Lab is announcing its latest step in its mission to save the world. Understanding the importance of preserving past cultures, for the benefit of future generations, Kaspersky Lab is continuing its cooperation with the Archeological Society at Athens (ASA) to further develop its Akrotiri project, and save the remains of the historic Cycladic/Minoan settlement. Kaspersky Lab is sponsoring a number of activities to help the scientists further their work, including the restoration of the excavations, the conservation of spectacular wall paintings and the project’s building conservation work. Cooperation between the global cybersecurity company and ASA dates back to…
The Culture, Media and Sport inquiry into the TalkTalk hack has made a number of recommendations to companies to minimise and respond to data breaches including; fining companies should they fail to guard against cyber-attacks, linking CEOs’ pay to effective cyber security as well as jailing those who trade in stolen personal data for up to two years. Carl Leonard, Principal Security Analyst at Forcepoint, has provided the following comment on the recommendations. Carl Leonard, Principal Security Analyst at Forcepoint: “The select committee recommendations today serve as another reminder of the need to improve monitoring and protection of corporate data. The reality…
The Culture, Media and Sport Committee has published its report Cyber Security: Protection of Personal Data Online. This inquiry was launched in October 2015 following the cyber-attack on TalkTalk’s website. The Committee looked at cyber-security and the response to cyber-crime and broader issues around data protection. Jonathan Sander, VP of Product Strategy at Lieberman Software commented on this report below. Jonathan Sander, VP of Product Strategy at Lieberman Software: “The notion of the CEO and Board being involved in cybersecurity is essential. Often the implications and remedies to cybersecurity issues cut across every aspect of an organization’s operations. The bad guys don’t…
While most children will soon enjoy the summer holidays, some of them will enjoy being away from school for altogether less pleasant reasons – to get away from bullies, who bother them offline or online over social networks. Unfortunately, not every parent can distinguish common teenage difficulties from the red flags raised by insidious peers. As June 17th is Stop Cyberbullying Day, ESET Ireland has prepared a list of indicators that can help parents recognise whether their offspring is being (cyber)bullied. Snappy answers and moods swings Frequent moods swings do not necessarily mean that your child is being bothered by their peers.…
Installing security cameras is a great tool for managing your business. Not only are they inexpensive to purchase, easy to install and easy to maintain, but security cameras also provide business owners plenty of convenience to see all areas of their business in real time without sacrificing time or efficiency. Here are a few highlights of installing security cameras in your business. See, Respond to Heavy Foot Traffic There’s never any good that comes in keeping customers waiting in line for service. Having security cameras that constantly display parts of your store, warehouse, or wherever there may be heavy foot traffic…