It’s more than Halloween Straddling the divide between autumn and winter Halloween is a time of celebration and superstition. Its origins lie in the period of time when the Celtic nations dominated Europe and people would light bonfires and wear costumes to ward off roaming ghosts. The idea of divide still holds today and perhaps nowhere more prominent than the surface and light world of the everyday internet and the dark, mysterious and sometime malevolent world of the deep web where hackers and cyber criminals have their being and surface to wreak havoc. Halloween; it’s the time for ghouls, spooks…
Author: ISBuzz Team
New Barracuda NextGen Firewall Desktop Appliances Provide Branch Offices with Affordable Security and High Availability for Cloud, SaaS, and Other Mission Critical Applications Highlights : Barracuda launches industry’s first advanced next-generation firewall available in the sub-$700 price range, with the addition of four powerful new desktop appliances aimed at organizations that increasingly rely on cloud-based applications such as software-as-a-service (SaaS), Microsoft Office 365, and public cloud platforms such as Amazon Web Services and Microsoft Azure. The new Barracuda NextGen Firewall desktop appliances – models F18, F80, F180, and F280 – are designed for distributed networks, providing branch offices with advanced…
Data breach after data breach has rightly spurred a reaction from the business community. As organisations look to mitigate these concerns by investing in more security tools they will inevitably struggle to make sense of an increasingly competitive and varied market. Handling sensitive data while trying to facilitate compliance and maintain security is a top priority for many. Ultimately every organisation that manages sensitive data faces the same concern: keeping it safe. Managing file transfers is just one aspect to security and compliance, but can go a long way to keep sensitive data safe. Whether organisations choose a cloud, on…
French forensics researchers have dissected a real-world case in which criminals have outsmarted the chip-and-pin system with a seamless chip-switching trick—and pulled off the feat with a slip of plastic that’s almost indistinguishable from a normal credit card. Security experts from Tripwire have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Senior Security Analyst at Tripwire : “As the U.S. moves to chip and PIN, many are mistaken in thinking that this will end the rash of retail breaches. Chip and PIN will not mitigate the mass exfiltration of credit cards from retailers, but instead will make card-present related…
Bill Berutti president of the Performance & Availability product line and president of the Cloud Management / Data Center Automation product line for BMC Software, Inc is able to speak about how the cost of modern day data breaches are huge – not just in terms of data loss and damaged reputations, but also in terms of significant financial losses. [su_note note_color=”#ffffcc” text_color=”#00000″]Bill Berutti, President, Performance & Availability and Cloud Management/Data Center Automation at BMC : “In today’s digital, data-led economy, customers, employees and stakeholders can demand more from digital businesses, more than ever before. It is therefore imperative that businesses of all…
Impostors have attempted a Twitter phishing attack on users of Bitcoin Wallet Electrum. The attackers were clever, creating an exact clone of the original Electrum Twitter, but using an “I” (uppercase) instead of a lowercase “l.” On first glance, it’s hard to tell the difference. Interestingly, the phishers decided not to create a whole website around this concept, and have tweeted legitimate information about Electrum. But in one case, as ZoidbergCoin reported, they were most definitely phishing [su_note note_color=”#ffffcc” text_color=”#00000″]Kevin Epstein, VP of Threat Operations at Proofpoint : Is this attack innovative in any way? “This is an interesting variant…
Marks & Spencer was forced to suspend its website after customers were able to see other people’s details when they logged in to their accounts. Customers posted messages on the high street chain’s Facebook page to say they could see other people’s orders and payment details when they logged into their accounts. The firm said no customer’s details were compromised by the “technical difficulties”. IT Security experts explain what this could mean for customers and what companies should do to prevent such glitches. Jonathan Sander, VP of Product Strategy at Lieberman Software : What can go wrong even without hackers involved? What should…
The increase in the number of high-quality Wi-Fi connections has made it easier to work from anywhere. Even just a few years ago, the fixed desktop with an Internet connection was still the norm. Today, various mobile devices enable company staff to work in different locations so they no longer need a permanent desk. Mobile staff can share data with their coworkers – but this process needs to be secure. Accessing data from anywhere The physical location is not the only aspect of work that is becoming more flexible. Bring Your Own Device (BYOD) is standard practice in many areas…
Northumbrian enhanced remote support security and the end user experience with Bomgar. Bomgar has helped Northumbrian improve first-time resolution rates as well as time-to-resolution. Bomgar, a leader in secure remote support and access management solutions, has announced Northumbrian Water Group is using Bomgar Remote Support to deliver efficient and secure support to its users. Northumbrian provides water and sewerage services to 2.7 million people in the north east of England. The utility serves the major population centres of Tyneside, Wearside and Teesside as well as large rural areas in Northumberland and County Durham. Additionally, the company supplies water services to approximately 1.8 million people in the…
Although there’s no one right way to go about protecting any business from disaster, there are certain steps that apply to pretty much all businesses keen to ensure that critical business systems are up and running as soon after a disaster strikes as possible. Matt Kingswood, from nationwide managed service provider IT Specialists, explores the key steps to business continuity. Perform a business impact analysis The most important thing to consider in protecting your business from a disaster of any kind is to create a plan in advance. The first step is to perform a business impact analysis (BIA), which…