Blog Posts Tagged with "SMB"

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Increasingly Target Small Companies

August 26, 2012 Added by:Bill Gerneglia

Your company may not be the primary target, an attacker may use your organization as a stepping-stone to attack another. Don't be the weakest link in the supply chain. Information is power, the attackers know this, and successful attacks can result in significant financial loss...

Comments  (4)

F29746c6cb299c1755e4087e6126a816

Five Ways to Revamp Your Home-Based Business Security

January 26, 2012 Added by:Kelly Colgan

No matter how small your operation, or even if you only occasionally work from home, clients trust you to protect their data — and laws in 46 states requires that you do so. Businesses must notify clients whose information is compromised, and notification can be costly...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

InfraGard Launches SMB 'State of Cyber Security' Study

January 11, 2012 Added by:Headlines

Well-publicized breaches have clearly demonstrated that no business or government agency is immune to attack. It is in the interests of all to harden their systems to prevent damage or unintended release of information that is the lifeblood of their operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC's Ten Cyber Security Tips for Small Businesses

November 29, 2011 Added by:Headlines

"Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats..."

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Security – It’s All About Partnership

November 28, 2011 Added by:Ben Kepes

Cloud security is a two way street – both vendors and customers have a part to play in keeping it safe, and both parties need to bring something to the table. But, notwithstanding this fact, Cloud is still the best option for a number of SMB use cases...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Avatars, Mobiles and Other Security Stories…

November 07, 2011 Added by:Infosec Island Admin

There are so many learning resources out there in our profession, making it hard to know where to go for the really worthwhile insights on key issues like personal devices in the workplace, cloud security etc. Two upcoming online events in these areas that have really got people talking...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

The Impact of Mobility on the SMB Workforce

November 04, 2011 Added by:Bill Gerneglia

Small and medium businesses are increasingly more mobile as their employees are demanding increased access from both the home and the road like never before. SMBs face a wide range of challenges when it comes to providing this access for these mobile workforces...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Targeting Small Businesses

September 16, 2011 Added by:Robert Siciliano

Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Software Security for the Cloud - Same Pig, Shiny Lipstick

August 03, 2011 Added by:Rafal Los

The bottom line here is this - migrating to a cloud architecture doesn't magically make your applications secure... although for many SMBs this is a better option than trying to tackle this problem alone. Let's talk this through...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Disaster Recovery for SMBs

July 27, 2011 Added by:Ben Kepes

There really is no excuse for not having a good DR strategy in place – having come through a serious earthquake myself, and having to relocate businesses several times – I’ve seen the pain caused by a reliance on physical hardware that isn’t replicated elsewhere...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Practical Security Management for Startups

July 22, 2011 Added by:Danny Lieberman

Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SMBs Face Growing threat from Mass Meshing Attacks

June 17, 2011 Added by:Headlines

"Because they can do it at such a precise level, when they attack they don't just inject a single malicious script like in mass SQL injections. They inject a backdoor, which allows them total control of all the files on the website..."

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Verizon Report: Hackers Target Small Businesses

May 26, 2011 Added by:Kelly Colgan

Hackers are changing their tactics and chasing opportunities. Black hats are honing in on lower-tier business targets—organizations with less savvy, maturity and investment in countermeasures. Once they identify vulnerability, they exploit it...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Prescriptive Software Security Assurance for SMBs

May 25, 2011 Added by:Rafal Los

Can you handle the work it would take to ratchet up security on your applications? If you've got more than a dozen applications with more then 5 in the pipeline, you can figure on a single non-dedicated resource being able to handle one application security test per week, tops...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: SMB's Lack Understanding of Mobile Security

May 20, 2011 Added by:Headlines

The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC's Ten Key Cybersecurity Tips for Businesses

May 17, 2011 Added by:Headlines

Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats...

Comments  (0)

Page « < 1 - 2 > »