Taking into consideration the leaks and vulnerabilities that have been brought to light over the past few years, network security is a critical priority for every organization. One problem many have is that while they are protecting their network and infrastructure from threats outside the business, there are real threats coming from the inside. Below we examine four ways threats can cause havoc from inside your business.
Macro Systems Blog
There’s a significant difference between turning off some appliance, like a TV or a microwave, and turning off your computer. Why does the computer take so long to actually turn off, and is there any way to speed up the process? Let's give you a few ideas as to how to accelerate up the shutdown process.
Every executive wants an office assistant that can assist with daily “grunt work.” These office assistants handle a lot of work that the owner simply doesn’t have time for. Alas, small businesses are working with a small budget, making the odds of affording extra help slim to none. Can Amazon’s Alexa offer another option for this predicament?
American healthcare organizations must store and exchange patient data in ways that comply with the HIPAA law, or else face hefty fines. One mental health service in Alaska recently learned this lesson the hard way after being hit with a $150,000 fine. Is your healthcare organization’s IT infrastructure 100 percent HIPAA compliant?
Everybody knows operating a computer under cooler temperatures increases its performance. This is why some server closets feel like a walk-in refrigerator. One thing about computers that you may not have known is whether or not running a PC at cooler temperatures extends its life. Logically, one would assume yes, however, the research says otherwise.
Wearable technology is still relatively new. While technologies like Google Glass have found enthusiastic users, in the eyes of the general public, the verdict is still out. The best thing a Google Glass user can do with their favorite new tech is to use it responsibly. Here's some tips on how to be a good AmGlassador!
We're seeing a lot of buzz about a controversial issue known as "net neutrality." It's primarily being discussed in the realms of American politics, but its ramifications affect every user of the Internet from around the world! We believe that what's happening to net neutrality is important, and that everyone should be informed about it.
Whether you're watching the World Cup or going on a business trip overseas, you will experience foreign cultures and run into what's known as "the language barrier." Thanks to technology, you can quickly and easily make sense of World Cup statistics, or make your way around a city where English isn't the norm.
Whether you're on the move or at the workplace, your WiFi connection isn't the most secure method of browsing the Internet. Hacking techniques are growing more sophisticated, and you never know who could be observing your connection and Internet activity. Thankfully, there are ways to remediate this issue, like using a Virtual Private Network (VPN).
In this day and age, your company's data is extremely important. Without it, your company would likely cease to exist. But, it's not just you - the entire world is this way, and the more information that's out there, the more storage and backup that is needed. Professionals are constantly looking for ways to expand the way we store data, and last month, Sony managed to discover something entirely new that may change the way that we store our information.
Take a moment to consider your answer to this question, "What would you do if all of your business's data was somehow lost overnight?" How would you react, and what would you do about it? Your data is valuable, so much in fact that your business would be lost without it, and likely wouldn't be able to run properly.
On May 7, 2014, the U.S. Securities and Exchange Commission (SEC) released a news alert declaring Bitcoin, and all other virtual currencies insecure and unsafe. Due to a rise in Bitcoin popularity, many investors and business owners like to use it for worldwide transactions. But, how safe is it, and how likely are you to run into a Bitcoin fraud scheme?
In December 2013, retail superpower Target was the target (hehe) of a massive data breach that could have affected as many as 110 million customers. On Monday, May 5, 2014, the CEO of Target, Gregg Steinhafel, announced that he would be stepping down, no doubt a result of the chaos that engulfed his company in the aftermath of this data breach. Target's CFO, John Mulligan, has stepped in as interim CEO until the position is filled once again.
GameOver Zeus, a member of the Zeus family of malware, has been discovered and disrupted by the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice. But, this is only a temporary respite from the danger the malware poses - in two weeks, the threat will be back, and very much alive.
Mobile devices are designed for different purposes than the big, bulky desktops are. The Chrome operating system of the Google Chromebook is a perfect example of this - it looks like nothing but a browser with a keyboard. Sure, it can't do everything a real computer can do, but it sure can do a lot more than some people give it credit for.
Firewalls are the first thing companies think of when it comes to data security. What is the last security risk on an organization's mind? Your most tech-savvy employee. If someone were to "get to" the employee overseeing your network, they would be able to do some serious damage. What are you doing to protect your data from the employees you trust the most?
Many websites around the world are still suffering from the nasty little bug called Heartbleed that we covered last month. This prompted over 30,000 TLS/SSL certificates to be revoked and reissued, but many of them were reissued with the same keys. If this was going to happen, why revoke and reissue them in the first place? They're still just as vulnerable as before, since Heartbleed could have leaked those same keys weeks ago.
eBay issued an official declaration on Wednesday, May 21, 2014 that one of its databases had been hacked. The worst part? This database, which housed users' passwords, was compromised. But, there is a silver lining to all of this - no information has been stolen.
None that they know of, anyway. The auctioning website is still cautioning users to change their passwords in light of the attack.