Blog Posts Tagged with "SMB"
August 26, 2012 Added by:Bill Gerneglia
Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...
January 26, 2012 Added by:Kelly Colgan
No matter how small your operation, or even if you only occasionally work from home, clients trust you to protect their data — and laws in 46 states requires that you do so. Businesses must notify clients whose information is compromised, and notification can be costly...
January 11, 2012 Added by:Headlines
Well-publicized breaches have clearly demonstrated that no business or government agency is immune to attack. It is in the interests of all to harden their systems to prevent damage or unintended release of information that is the lifeblood of their operations...
November 29, 2011 Added by:Headlines
"Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats..."
November 28, 2011 Added by:Ben Kepes
Cloud security is a two way street – both vendors and customers have a part to play in keeping it safe, and both parties need to bring something to the table. But, notwithstanding this fact, Cloud is still the best option for a number of SMB use cases...
November 07, 2011 Added by:Infosec Island Admin
There are so many learning resources out there in our profession, making it hard to know where to go for the really worthwhile insights on key issues like personal devices in the workplace, cloud security etc. Two upcoming online events in these areas that have really got people talking...
November 04, 2011 Added by:Bill Gerneglia
Small and medium businesses are increasingly more mobile as their employees are demanding increased access from both the home and the road like never before. SMBs face a wide range of challenges when it comes to providing this access for these mobile workforces...
September 16, 2011 Added by:Robert Siciliano
Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...
August 03, 2011 Added by:Rafal Los
The bottom line here is this - migrating to a cloud architecture doesn't magically make your applications secure... although for many SMBs this is a better option than trying to tackle this problem alone. Let's talk this through...
July 27, 2011 Added by:Ben Kepes
There really is no excuse for not having a good DR strategy in place – having come through a serious earthquake myself, and having to relocate businesses several times – I’ve seen the pain caused by a reliance on physical hardware that isn’t replicated elsewhere...
July 22, 2011 Added by:Danny Lieberman
Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...
June 17, 2011 Added by:Headlines
"Because they can do it at such a precise level, when they attack they don't just inject a single malicious script like in mass SQL injections. They inject a backdoor, which allows them total control of all the files on the website..."
May 26, 2011 Added by:Kelly Colgan
Hackers are changing their tactics and chasing opportunities. Black hats are honing in on lower-tier business targets—organizations with less savvy, maturity and investment in countermeasures. Once they identify vulnerability, they exploit it...
May 25, 2011 Added by:Rafal Los
Can you handle the work it would take to ratchet up security on your applications? If you've got more than a dozen applications with more then 5 in the pipeline, you can figure on a single non-dedicated resource being able to handle one application security test per week, tops...
May 20, 2011 Added by:Headlines
The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...
May 17, 2011 Added by:Headlines
Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats...
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015