published-external Security

Protect individuals and their devices within an organisation, not just their desktops

The classic approach to secure a company is to secure its assets against all attack vectors: laptops, workstations, servers, storage entities and programmes. The standard attack methods are usually: infections through files carried on USB sticks, memory cards, mobile hard drives, downloaded files network attacks (spoofing, DOS) vulnerabilities that get exploited in common software   […]

General

Avira PC Cleaner – a second opinion scanner

The PC Cleaner is a scanner which can be used in parallel with other antimalware products. It is created for users of other security products that think that they might have a malware infection which their security solution doesn’t detect. It works on any PC, note- or netbooks with operating system Windows XP SP3 and above. It […]

improve-your-security

IT Security Myths on Improve-Your-Security.org

You surely know of my free eBook “Improve Your Security” available here. I started to publish there a series of IT Security myths which will make you say “Oh, SHIT!!!”   Here they are: http://improve-your-security.org/category/myths/ These are the first three: Most victims of malware often think, “This can never happen to me. Our network is secure, […]

Uncategorized

Information security in the Social Media age

A company doesn’t exist anymore if it is not present on at least a few social media platforms. Depending on the area they are active, they could go for average consumer or for highly skilled professionals. In order to address their customers, they need to use one or another social media platform. However, the tendency […]

published-external quoted

Three key security threats seen during 2013 – and how to protect against them

Originally published here: http://grahamcluley.com/2013/12/three-key-security-threats/ 1. Security breaches and hacks   2013 was the year that major security breaches and hacks really took hold. Millions of credentials were stolen from the likes of Twitter, Tumblr,Yahoo, Adobe and many others. Whenever data breaches like this occur, targeted attacks against the users of such wesbites can quickly follow. The targeted attacks usually consist […]