Security

Bring Your Own Identity (BYOI) is the next evolution of BYOD

Many technology and security experts predict that “Bring Your Own Identity is the next evolution of BYOD. However, the experts are mixed on the security of BYOI. Some say it will make security stronger because of the way identity is used to connect to websites and networks; others say that by using third-party identities, employees […]

distributed systems quoted Security Spam & Phishing

Some thoughts about the spam attack sent through InternetOfThings (Proofpoint)

http://www.proofpoint.com/about-us/press-releases/01162014.php More than 750,000 Phishing and SPAM emails Launched from “Thingbots” Including Televisions, Fridge Note: An article about this has been published by Richard Adhikari in TechNewsWorld.   A general comment on the entire story. Security researchers usually use spamtraps (an email address that receive nothing else than pure spam) to collect these emails and […]

published-external Security

Protect individuals and their devices within an organisation, not just their desktops

The classic approach to secure a company is to secure its assets against all attack vectors: laptops, workstations, servers, storage entities and programmes. The standard attack methods are usually: infections through files carried on USB sticks, memory cards, mobile hard drives, downloaded files network attacks (spoofing, DOS) vulnerabilities that get exploited in common software   […]

Security

Protect business information outside your organisation

Credits:http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/business-information European Cyber Security Month an EU advocacy campaign that takes place in October Protect business information outside your organisation Ensure you keep sensitive information secure: When you are outside your organisation, ensure you keep sensitive information and equipment secure at all times to prevent theft or loss. In particular when you are in public […]

Security

Protect your personal information and identity

Credits:http://cybersecuritymonth.eu/press-campaign-toolbox/ecsm-material/personal-information-identity European Cyber Security Month an EU advocacy campaign that takes place in October Protect your personal information and identity Use a strong password: Your password is the equivalent of the lock and key to your house on the Internet. Passwords are a major defence, and developing good password practices will help keep your sensitive […]