Article archive

Boom! April fools!?

03/26/2009 11:52
As the warm weather begins to set in, something besides April showers may be approaching. A malicious program called Conficker (a.k.a. Worm_DownAD.AD, Trojan.Win32.Pakes.lxf, W32.Downadup) has been propagating throughout the internet and making headlines. This malware (malicious software) has...

Internet pain reliever…

03/02/2009 09:49
One of the primary goals of Information Security is to maintain the availability of information, and this month we will be discussing the availability of your internet connection. With lower costs and increased throughput, the internet is more of a vital business tool than ever. So just how painful...

Backing up is hard to do...

01/30/2009 10:27
Have you ever experienced the nauseating sensation of data loss? If so, you are most likely a firm believer in backing up your information. Whether it was a deleted proposal that could have save you hours of work, or a presentation that someone wrote over, or a hard drive that died, there is no...

Some Un-jolly Tidings...

12/31/2008 19:49
With the holidays here, there are many not-so-jolly “traditions” that are percolating through the internet. Specifically, we are focusing on the social engineering attacks frequently referred to as a confidence trick or as a con. A con is the basis for a number of online or computer...

IE 0 Day Exploit

12/12/2008 19:27
Microsoft reported a new "zero-day exploit" that affects most versions of the Internet Explorer browser. A zero-day exploit is a security vulnerability that is being exploited before the software vendor or public know that the issue exists. This particular exploit attacks flaws within Internet...

In whom do we trust?

11/21/2008 13:40
It’s one thing when private and personal information is breached through accident, theft, or the occasional cracker hacking the systems. While damaging, these occurrences can be defended against and the risk can be mitigated and managed through various means. That being said, it is quite another...

Hunting the Elusive Email...

11/06/2008 10:20
Litigation is an unpleasant fact of life for many businesses and it now has serious Information Systems implications. E-Discovery (Electronic Discovery) rules shine a very bright spotlight on your Information Systems policies and procedures, and how well they are implemented. The policies,...

Survival of the Adminless

09/30/2008 15:41
Just how dependent is your organization on your computer/network/systems administrator(s)? I like to think that all administrators are a Nietzschesque breed of super-humans who never get sick, hit by busses, retire, win the lottery, take other jobs, or quit. Unfortunately, statistics show...

The Authentication Factor

07/15/2008 09:58
With the increasing sophistication of malware and other security threats, it has been obvious for quite some time that the standard “locks” we are using to secure our information may not be up to the task. The venerable “username and password” combination is generally used for everything...

Security insecurity: How concerned should you be?

05/28/2008 11:53
Information Security cannot be achieved with just a device or program, but must be embraced as a foundation for building your organization. These days, it’s not only giant multi-national conglomerates that are experiencing security issues with hackers, viruses or breaches. Increasingly, it’s small...
Items: 21 - 30 of 36
<< 1 | 2 | 3 | 4 >>