Skip to content

Cyber Security Threats 2016 – Part 2

January 15, 2016

Welcome back! And it’s Friday, I am hopeful your week was successful and productive!  If your organization is concerned about security take a look at the case of APTS – ADVANCED PERSISTENT THREATS .

APT, sophisticated social engineering – such as meticulously targeted phishing – is combined with sophisticated technological tools that can camouflage themselves on networks and relay information back to a central server in order to very explicitly fool an enterprise and steal data.  According to IT association  ISACA , one of four  companies or 28% have already experienced an APT attack.

Internationally deployed and targeted with a specific goal in mind, APTs represent a growing threat, especially to government enterprises. They tend to go a long time without being either discovered or effectively cleaned, leading to very large amounts of top-secret data being stolen of a duration of months, if not years.

It is more critical than ever for cyber security leaders, IT professionals and business owners to have a thorough understanding of these threats, and to be prepared to quickly and effectively respond.”

Next week – Hacks Targeting User Data..

Cyber Security Threats 2016 – Part 1

January 11, 2016

To say that data breaches are a growing problem is perhaps an understatement.  The frequency with which enterprises of all sizes have found themselves targets, and victims of online criminality, has increased at a fantastic rate.  From public schools, government institutions, health care, private and publicity owned businesses appear to be at risk for fraud and cyber attacks.  But there is hope! Security professionals are finding ways to get ahead of the threats . The malware and the people using it are getting smarter and a new model, based intelligence, is  necessary.

Intelligence on where threats are arising, their capabilities and their targets – is necessary to keep up with the threats. That is digital threat intelligence.

To keep an enterprise secure and understand the role of digital threat intelligence we will take a look at the most recent trending exploits to appear on the cyber threat landscape. Till next time lock it up and stay secure!

 

WELCOME 2016

January 8, 2016

Happy New Year! I am excited about the possibilities and opportunities that this year will bring.  There will be new technology to learn, new social media to implement and creating new marketing for our businesses.

I will be creating new posts that will be engaging, something to think about and it is my intention that you will be inspired to take action with your business that brings liveliness, growth, fun and thrive so your excited about 2016.

2016 start your engines!

WHO’S LURKING IN THE SHADOWS

November 2, 2015

Baiting, Click-Jacking, Cross-Site Scripting (XSS), Doxing, Elicitation and Pharming.  According to Facebook people in the US spend 9 hours every day with digital media and 40 minutes of those 9 are on Facebook. We reach out to our friends, business associates and loved ones. We at times enjoy sharing videos, funny crazy posts and look forward to the Happy Birthdays.

Here are some helpful hints to be aware and think about so keep your privacy private. Have a great week!

And by the way if you need anything regarding your business growth check out my website here.

Boo…….

October 30, 2015

Have a safe and enjoyable “Halloween or Harvest” weekend!

P.S.No that is not my child:)

JUST CHECKING THE BOX ON A PCI COMPLIANCE PROJECT IS NOT A GOOD IDEA!

August 18, 2015

Having a sixteen year background in payment processing and all that goes with it is constantly changing.  And in today’s data security environment it is critical to be engaged in protecting my clients best interest and that is their business.  Here are six excellent requirements for PCI Compliance an MSP must put in place:

Build and maintain a secure network

~Install and maintain a firewall configuration to protect cardholders data.

~Not use vendor-supplied defaults for system passwords and other security parameters.

Protect cardholders data

~Protect stored cardholders data.

~Encrypt transmission of cardholders data across open, public networks.

Maintain a vulnerability management program

~Use and regularly update anti-virus software.

~Develope and maintain secure systems and applications.

Implement strong access control measures

~Restrict access to cardholders data by businesses need-to-know.

~Assign a unique ID to each person with computer access.

~Restrict physical access to cardholders data.

Regularly monitor and test networks

~Track and monitor all access to network resources and cardholders data.

~Regularly test security systems and processes.

Maintain an information security policy

~Maintain a policy that addresses information security.

It is important not only to educate our clients regarding data protection from terminal hardware and WiFi based terminals, the importance of PCI Compliance are the standards to which we operate as a group to ensure we are providing the best technology.  Thank you techtarget.com and Margaret Rouse from WhatIs.com 

IT’S FRIDAY!

July 17, 2015

A simple message to my followers! Enjoy your weekend!

%d bloggers like this: