The toughest challenge in any new process is taking the first step. Once you’ve started the work, you can build momentum to carry forward. Let’s consider how to get started with business continuity planning.
BRAND-NAME SOFTWARE BUGS with flashy public relations campaigns are commonplace since the Heartbleed vulnerability was announced in 2014 with a media-friendly name, logo, and web site. But another bug is on the horizon that is setting a new bar for brand-name bug disclosures. It’s called Badlock and it’s already receiving a lot of controversial attention,..
If the Target data breach has taught us anything, it’s that failing to protect customer privacy can result in serious fines and reputation issues. During the 2013 holiday season, Target confirmed publically that credit and debit card information for 40 million of its customers had been compromised (as well as email and mailing addresses for..
Azure Security Center offers increased visibility and insights into your Azure resources and Azure workload security. The Power BI content pack enables you to visualize, analyze, and filter recommendations and security alerts. The out-of-the-box dashboard and reports are created on top of your Azure Security data, enabling you to see and analyze it. This post..
Cortana, Microsoft’s assistant app in Windows 10, is getting even more nosey than before. We’re told Redmond will scan your email, in order to remind you to keep your commitments. Sounds benign — helpful, even. But some are worrying that it’s just one more privacy invasion from the Pacific Northwest. Even though you can turn it off,..
As the take up of cloud computing continues to increase, it’s fair to say that most with even a cursory association to IT have developed some kind of opinion on this revolutionary technology. While thousands of ardent fans sing its praises and strongly encourage its adoption, an equal number of critics tell tales of cloud..
Cloud computing has proven a boon to businesses—especially small businesses, for which it hits a particularly sweet spot. With cloud services, small businesses reap the benefits of not having to deploy physical infrastructure like file and e-mail servers, storage systems or shrink-wrapped software. Plus, the “anywhere, anytime” availability of these solutions, means hassle-free collaboration among..
Malvertisers are once again abusing ad technology platform AdSpirit and exposing visitors of the MSN homepage to malware. These attacks appeared to have been primarily focused on Germans users via an ad for Lidl, one of the Germany’s leading supermarkets. This is not the first time we have caught malvertising on MSN or via AdSpirit…
After lying relatively low for a few months, malware and ransomware have once again reared their ugly heads. Last week, Google removed more than a dozen malware-infected apps from its Google Play store. And variations of the CryptoLocker and CryptoWall viruses, which plagued the IT world in 2014 and 2015, have started appearing as well,..
It seems that Google Chrome has become the browser of choice for the majority of Internet users worldwide. Chrome offers its users a fast and reliable browsing experience across all devices. The Chrome Web Store also houses thousands of powerful add-ons to enhance Chrome’s features. But deciding which extensions to download can be difficult, since..