Blog

Latest from our blog

Mobile Security Misery: A 733% Increase over the Last 5 Years

Posted by on 2:51 pm in Blog

The latest results are in from the 5th annual State of the Endpoint study by the Ponemon Institute – headlined by a whopping 733% increase in concern over mobile usage in the workplace compared to 5 years ago. As smart devices become increasingly prevalent in regular work life, accordingly the threat landscape has fundamentally changed over the last 5 years. While the threat of mobile-based attacks increase year after year, it seems surprising that businesses are still so slow in modifying their security strategies. Here is a summary of the...

read more

How to detect the ZeroAccess botnet on your network and stop it broadcasting

Posted by on 8:50 pm in Blog

How to detect the ZeroAccess botnet on your network and stop it broadcasting

For those of you who do not yet know, ZeroAccess is a Trojan-horse malware that infects Windows- based machines to form a botnet. Compromised machines will then either start mining Bitcoins, or participate in mass click fraud. Estimates on infected computers range from 1 to over 9 million computers (such things are notoriously difficult to determine), and are estimated to be generating about $100,000 profit per day, or about $2.7 million each month. This particular botnet was recently targeted by a coalition led by Microsoft, the Europol...

read more

2013 in Review: This year’s biggest security, scam, and malware threats

Posted by on 1:00 pm in Blog

2013 in Review: This year’s biggest security, scam, and malware threats

2013 has been an interesting year for the IT security world, with several new types of attacks surfacing, along with the growing popularity of some well-established threat vectors. High profile data breaches this year included Evernote, Adobe, Twitter, Facebook, the Federal Reserve, and even the Department of Homeland Security among many – many others. As many of you know – the potential impact of a serious security breach on our daily lives has been growing, and will only continue to grow is we increasingly depend on the internet to handle...

read more

8 Useful Mobile Security Apps for the BYOD Business Road Warrior

Posted by on 11:09 am in Blog

Smartphones and tablets are nothing new, and for many have become an essential part of our lives. It should be no surprise to anyone that people would demand easy mobile access to their work files – whether to keep up with developments away from the office, or taking your materials to a client presentation. Providing this type of easy access however, especially in a BYOD (Bring Your Own Device) type environment – is very challenging for even the largest and most “tech-forward” companies. This is because providing a secure and reliable BYOD...

read more

New research from HP finds 9 out of 10 mobile apps have obvious security flaws

Posted by on 12:08 pm in Blog

In the rush to deliver enterprise mobile apps to employees, it seems that even the largest Global 2000 companies are forgetting about their own established IT security practices. While this may not seem so surprising considering the immense pressure to deliver apps that let people take their work on the road, this is still an alarming trend just waiting to be exploited. 2,107 mobile apps from 601 companies on the Global 2000 list were tested by HP Fortify, the company’s enterprise security division. While these tests were limited to the iOS...

read more

It’s National Cyber Security Awareness Month: What Are Your Resolutions?

Posted by on 4:12 pm in Blog

In case you hadn’t heard yet – for 10 years now October has been declared the National Cyber Security Awareness Month (NCSAM) by the National Cyber Security Alliance. An initiative designed to promote awareness of security issues, and educate people on how to mitigate or combat these issues. In the spirit of NCSAM – we’ve put together a few tips and general advice for you to chew on. Hopefully at least some of you will take some steps today to improve your security habits. 1. Understand that security is a shared responsibility. It often goes...

read more

Help – my web service has been hacked! What do I do?

Posted by on 4:07 pm in Blog

So you’re going about your day as normal, and then you notice something awry. This can happen on your website, web service, or user accounts (including email, social media, and so on). No matter what the case, here are some bad signs that your web service has been hacked: You cannot access your website or user account. Your website / webpages are defaced. Your website redirects to another “unsavory” site, such as a porn or pharmaceuticals pusher. Your contacts list notifies you that they have received strange messages from you. Google or Bing...

read more

There is no such thing as a “safer” web browser

Posted by on 4:04 pm in Blog

Some people take their web browser choice seriously. Other people working in a corporate environment will often bemoan their lack of choice in web browsing. Of course your personal preferences can come down to any number of factors – but if you’re making your choice based on the idea that one browser is “safer” than the others – then we have some interesting news to report to you from NSS Labs. NSS Labs is a research company that regularly compares the security capabilities of all the major web browsers. According to their latest research –...

read more

Securing Your Email – or Why You Should Stop Using Free Email Services for Business

Posted by on 4:03 pm in Blog

Email is tragically insecure. There is simply no way around it – and if you’re using free email services such as Google Gmail, Yahoo Mail, or Microsoft’s Windows Live Hotmail – you are leaving yourself far more exposed than you might realize. The problem with email security is that the system is inherently designed to facilitate quick communication between anyone with a valid email address. Regardless of where the sender and recipient are located, or which email service provider is being used. All emails must be stored *somewhere* until they...

read more

We’ve put together a massive list of infosec / compsec resources for your reading pleasure.

Posted by on 4:01 pm in Blog

SCWOA has launched a new free reference site – called Deploy6 – for people serious about their security, or would just like to know more about security issues in general. There’s lots of links and publications to peruse, especially if you’re curious about some of the US government legislation that affects how security (should be) handled by organizations in possession of your private data.   Our list of resources on Deploy6 includes: Downloadable security reports Security technology buying guides A variety of interesting podcasts Video...

read more