What the Apple-IBM Partnership Means for IT Professionals
ZDNet reports that IBM and Apple are partnering to develop mobile products for businesses, effectively combining Apple's iPad and iPhone infrastructure with IBM's device security and big data...
View ArticleBlackphone and Blackberry Duke It Out, But the Fight May Be Futile
A recent ZDNet article gives a blow-by-blow account of the fight between Blackberry and Blackphone over which company offers better mobile security. In a series of back-and-forth blog posts, the...
View ArticleData Breach Research Shows Hackers Love Weak Java
Symantec's Internet Security Threat Report, a post-mortem analysis of the previous year's cyber attacks, comes to a startling conclusion: 97 percent of zero-day attacks were Java based.A zero-day...
View ArticleFacebook at Work: A Data Security Issue?
Many employers block access to Facebook, Twitter, and other social media sites in order to keep their employees focused on the task at hand. But now IT professionals might have new reasons to limit...
View ArticleMobile Security Update: 1 in 10 Android Apps Is a Virus
HackSurfer reports on the sorry state of cyber security on the Android platform where 1 in 10 apps contains malware. Yikes.You read that correctly: 10 percent of Android apps are malware. Over the last...
View ArticleIT Professional's Firing Would Have Been a Lawsuit for an IT Contractor
The Arizona Republic reports that Miguel Corzo, a community college IT employee who had been working in the district for 30 years, has been fired after his actions led to a data breach that has already...
View ArticleCalifornia Data Breach Law Raises as Many Questions as It Answers
IT consultants are subject to a variety of state laws. Your legal responsibilities change from state to state, and each new court ruling – such as the one that just occurred in California – can...
View ArticleWhen Deleting Malware Isn't Enough
Citadel, a particularly potent strain of banking malware, has been pestering IT security consultants for the last two years. ThreatPost reports that the latest strain has found a way to return to...
View ArticleWhy Comcast-Style Customer Service Would Be Death to Small IT Contractors
If you have eight minutes to spare and you enjoy listening to grueling customer service phone calls, we strongly recommend this piece of undercover journalism by techie journalist Ryan Block.In the...
View ArticleMega-Breach Is an Excellent Client Education Opportunity
When Target's data breach hit the front pages, many small-business owners saw it as evidence that hackers only go after big business. But the latest – and largest– data breach, which stole 1.2 billion...
View ArticleBlack Hat Security Conference: Hackers Can Steal Your Car
Last week's Black Hack security conference brought exposure to countless security flaws in nascent Internet-of-Things technology. CBS News reports that security consultants have found ways to...
View ArticleOld Technology Is a Cyber Liability
In last week’s blog post, "Black Hat Security Conference: Hackers Can Steal Your Car,” we looked at how new technology – the Internet-of-Things and Internet-enabled cars – exposed consumers to greater...
View ArticleHow Much Does a Data Breach Cost?
The final cost of a data breach can be hard to pin down. Dozens of factors affect the cost of a breach, and you can’t know what the total price tag will be until the dust settles. Sometimes, that takes...
View ArticleOnly 1% of Cloud Service Providers Meet Proposed EU Regulations (and Why This...
The European Union's new data security regulations could come into effect as soon as 2015 or 2016 (they aren't law yet), but as ZDNet reports, practically no cloud service providers are prepared to...
View ArticleCDD Complaint Suggests We're in the "Wild West" Stage of Digital Privacy
ITworld reports on a brewing data security dispute between a group of 30 U.S. companies and the privacy watchdog Center for Digital Democracy. Companies such as AOL and Adobe have been accused of not...
View ArticleCDD Complaint Suggests We're in the "Wild West" Stage of Digital Privacy
ITworld reports on a brewing data security dispute between a group of 30 U.S. companies and the privacy watchdog Center for Digital Democracy. Companies such as AOL and Adobe have been accused of not...
View ArticleIT Professional's Firing Would Have Been a Lawsuit for an IT Contractor
The Arizona Republic reports that Miguel Corzo, a community college IT employee who had been working in the district for 30 years, has been fired after his actions led to a data breach that has already...
View ArticleInnovative Malware Offers Another Argument against Jailbreaking
SecurityWeek reports on a new and innovative malware that hackers are using against jailbroken iOS mobile devices.The malicious software, dubbed iOS / AdThief or Spad, modifies various apps' SDK so...
View ArticleE-Discovery Firm's Growth Highlights Growing Cyber Liabilities All Around
One of the reasons we see an increasing number of large data breaches is simply because there's more data now than ever before. This data explosion is producing a growing market for IT companies that...
View ArticleHacking Victims May Have a New Worry: FTC Penalties
This week on the blog, we've discussed the difficulties IT professionals have with data security laws: they don't know which data security laws (if any) they need to follow and they don't know how...
View Article