Security Breach

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
1,196
Score:
Unrated

The 2014 Global Economic Crime Survey conducted by PwC shares a startling statistic about cyberattacks: “seven percent of U.S. organizations lost $1 million or more due to cybercrime incidents in 2013, compared with three percent of global organizations; furthermore, 19 percent of U.S. entities reported financial losses of $50,000 to $1 million, compared with eight…

+ read more

Travis Greene
May 21, 2015
10:04 am
Reads:
2,370
Score:
Unrated

With the release of the 2015 Cyberthreat Defense Report last week this number nerd took some time to review and collate some of the IT Security statistics and numbers that have piqued his interest or curiosity over the last few months. From protecting user data against the growing number of threats to ensuring the continuity…

+ read more

David Shephard
Mar 16, 2015
1:51 pm
Reads:
40,518
Score:
4.75

While the hackers in movies continue to use brute-force methods to breach security, fingers flying on keyboards as firewalls fall, real attackers today prefer the subtler method of hijacking insider credentials. Frankly, it’s far easier to figure out a user’s password or get them to click a link in a phishing email. To reduce the…

+ read more

Travis Greene
Mar 5, 2015
7:45 am
Reads:
4,808
Score:
5

It seems like the number of companies embracing bring-your-own-device (BYOD) policies is growing every day, with some countries seeing double digit percent growth in the number of mobile devices each year . Some people estimate  that the amount of active mobile devices (including cellular phones) will exceed the population of the earth by 2014. But…

+ read more

David Shephard
Nov 6, 2013
8:25 am
Reads:
3,042
Score:
Unrated

I have spent the last couple of weeks working with one of our partners with regards to a solution encompassing of technology and services to meet the most immediate requirements for their healthcare customers.It also provided an opportunity to do a little research on our current healthcare customers and solutions that they subscribe to using…

+ read more

Jul 29, 2013
4:14 pm
Reads:
2,900
Score:
5

A month or more of high profile security breaches have reinforced the importance of data protection as a CIO agenda item. Naturally, if a security vendor like RSA can succumb to an attack, all organisations have to ask themselves: Is their IT security fit for purpose? Coincidentally, the RSA and the other incidents happened around…

+ read more

jdierks
By: jdierks
May 31, 2011
1:22 pm
Reads:
5,082
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow