Yearly Archives: 2016

  • What Happens When You Reply to Spam

    Posted on October 7, 2016 by in News

    Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, weeks-long exchange with a spammer who offered to […]

    Comments Off on What Happens When You Reply to Spam Continue Reading...
  • Doubled-Edged Sword of Encryption

    Posted on September 29, 2016 by in News

    When it comes to protecting payment transactions and other sensitive data, encryption makes a lot of sense. If a hacker is able to intercept the data in transit, only jumbled, unintelligible characters are visible instead of the credit card data, social security numbers or other sensitive information hackers seek. So, what’s the problem?  

    Comments Off on Doubled-Edged Sword of Encryption Continue Reading...
  • Don’t Ignore the Yahoo Hack

    Posted on September 23, 2016 by in News

    The latest Yahoo hack is a doozy you shouldn’t ignore. The company said on Thursday at least 500 million user accounts were affected by a massive data breach. The hack happened in 2014, when “state-sponsored actor” stole account information, including names, emails, passwords, telephone numbers and answers to some security questions. What to do if […]

    Comments Off on Don’t Ignore the Yahoo Hack Continue Reading...
  • Data Breach at Oracle’s MICROS Point-of-Sale Division

    Posted on August 26, 2016 by in News

    A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp., KrebsOnSecurity has learned. More alarmingly, the attackers have compromised a customer support portal for companies using Oracle’s MICROS point-of-sale credit card payment systems. Asked this weekend for comment on rumors of a large data breach […]

    Comments Off on Data Breach at Oracle’s MICROS Point-of-Sale Division Continue Reading...
  • Spotlight on the Shadow Brokers…and a Response from Cisco

    Posted on August 19, 2016 by in News

    The mysterious group has seized the attention of the cybersecurity world with its claim to have stolen code from the Equation Group — a team of hackers who have been tied to the National Security Agency. On a website written in broken English, the Shadow Brokers revealed some files and promised “better” ones available, for […]

    Comments Off on Spotlight on the Shadow Brokers…and a Response from Cisco Continue Reading...
  • Cisco Cyber Security Mid-year Report

    Posted on August 12, 2016 by in News

    Attackers currently enjoy unconstrained time to operate. Their campaigns, which often take advantage of known vulnerabilities that organizations and end users could have— and should have—known about and addressed, can remain active and undetected for days, months, or even longer. Defenders, meanwhile, struggle to gain visibility into threat activity and to reduce the time to […]

    Comments Off on Cisco Cyber Security Mid-year Report Continue Reading...
  • Black Hat: Quick Look at Hot Issues

    Posted on August 5, 2016 by in News

    Black Hat includes a variety of security topics from how USB drives are a menace and how drones are fast becoming a threat you need to pay attention to and much more. Here we take a look at just a few of the hot topics presented at the conference. View Slideshow Here

    Comments Off on Black Hat: Quick Look at Hot Issues Continue Reading...
  • Ruckus Cloudpath ES

    Posted on July 29, 2016 by in News

    Watch Short Cloudpath Video Here An overview of the Cloudpath Enrollment System (ES) by Ruckus Wireless. Cloudpath ES provides automated, self-service onboarding for BYOD, guests, and IT assets using WPA2-Enterprise and 802.1X. With built-in PKI and integration with Microsoft Certificate Services, Cloudpath ES ensures every user and device is connected, identifiable, and secured with the […]

    Comments Off on Ruckus Cloudpath ES Continue Reading...
  • Clinton Investigation Shines Uncomfortable Light on Shadow IT Issues

    Posted on July 22, 2016 by in News

    Putting all politics aside, Hillary Clinton’s use of a private email server to transfer sensitive documents has brought up two important issues that business and IT leaders need to address.  The first is to establish the degree to which end users are to be held accountable for circumventing an IT environment.  The second thornier issue […]

    Comments Off on Clinton Investigation Shines Uncomfortable Light on Shadow IT Issues Continue Reading...
  • Workplace Collaboration Is a Key Part of the Employee Experience

    Posted on July 15, 2016 by in News

    Collaboration tools allow employees to work with each other seamlessly and professionally. Unified communications and collaboration (UCC) solutions are the vehicles for these tools, and they can be implemented on premises, in the cloud, or in some combination of premises-based and cloud-based configurations. However they are provisioned, UCC tools offer organizations increased productivity and efficiency, […]

    Comments Off on Workplace Collaboration Is a Key Part of the Employee Experience Continue Reading...