EZProtect Archives - Adaptus

In part 2, I will discuss your organization's supply chain.  Even if your organization's IT network is protected, your supplier may not be!  Why should you encourage the board to take this into consideration?  With today's delicate economy, the stability of the supply chain is also under threat.  An attacked supply chain can potentially be disastrous to profitability, business continuity, and compliance. 

Read More
shutdown

At the moment, many of the Department of Homeland Security employees responsible for civilian cybersecurity efforts, including threat analysis and sharing information with private industry, have been furloughed. But even if the shutdown ends soon, it may scare talented people away from taking government cybersecurity jobs—which are already a struggle to fill.

Read More
holiday

Over the next few days and weeks, many people will find themselves traveling to visit with friends and family to celebrate.  Use these tips to help stay safe this year.

Read More

An inspector general's report finds unencrypted thumb drives, classified servers without locks on them and unrepaired computer bugs going back to 1990.

Read More
report

The Cybersecurity Strategy Report released on December 7 sidesteps the crises du jour by taking a bigger picture, practical and non-partisan view of what’s going wrong and how to fix things. It seeks to articulate how “traditional information technology (IT) strategies seem largely ineffective at stemming the growing tide of cybersecurity incidents.”

Read More
biometrics

The method is not yet being widely utilized by consumers or enterprises – and for those who are using identification via fingerprint, voice, eye scan or facial recognition, security risks still exist.

Read More
Stepping out

Successful hacking campaigns used to be all about keeping under the radar. But, for some, making a big splash is now more important than lurking in the shadows.

Read More
7 signs of insider threats

Why do insiders attack? Usually it will be for financial gain. Either someone is offering money for certain information, or they believe they can sell it online. Sometimes the motive will be revenge for a slight against them. It may be in retaliation for receiving a warning or disciplinary action or poor performance review, being passed up for a promotion or project, disagreements around salaries of bonuses, or being laid off. Sometimes it will be for a career benefit, for example taking contact details for customers or valuable intellectual property (IP) to a new employer.

Read More
predictions

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Read More
travel-by-plane

A little over three-quarters (77 percent) of workers say they connect to free or public WiFi while during travel. Some 63 percent will use public WiFi to access work emails and files. Those are just a couple top line findings from a chilling (if predictable) new digital security survey conducted by threat management company ObserveIT. The survey included […]

Read More