News

Topic: Security

Cloud security challenges go all the way to the board

In the rush to take advantage of cloud's benefits, businesses must properly manage the risks of handing over data, systems, and infrastructure to a third-party. 

Heartbleed's lesson: Passwords must die

The Heartbleed bug in the Open Source OpenSSL library has brought renewed attention to the weaknesses of passwords, the mechanism that has been the foundation of computer security for at least 50 years.

5 Quick Questions: Securing Data Without Hindering Work Flow

Manufacturers in general do a good job of protecting their data, but the task of making sure that access within the organization is restricted on a need-to-know basis can be monumental.

Customer Data Requires Full Data Protection

The big data analytics tools used to mine this information in the first place could themselves be implemented in securing it. With the strategic use of big data and customer relationship management (CRM) tools, even small and midsize businesses (SMBs) will have the ability to protect their customer data from breaches...

SecureRack: The New Virtual Data Centre in Switzerland

The Internet Service Provider Backbone Solutions AG has launched  http://www.securerack.com, a new IaaS (Infrastructure as a Service) solution that complies with the highest security requirements and is globally offered to small, medium and large companies.

The internet of things needs anti-virus protection

As the internet of things grows and more devices than ever have network connectivity baked in, you might start to wonder what protects all of these smart home appliances and media streaming dongles against hacks. The problem is particularly troubling in an industry where there are internet routers in every office and a voice over internet protocol (VoIP) phone on every desk. Even if attackers can't get into your computer because it's running anti-virus software, they can still get eyes and ears in your office by hacking a VoIP phone or video console unit. And since those devices are behind office firewalls, they might even be able to infiltrate network servers from there.

ERP Project 101: Organizational Fit Gap | ERP the Right Way!

We can all agree that organizational fit is a key consideration for successful ERP selections and implementations. However, mention the phase “fit/gap” or “gap analysis” and most people will fixate on the ERP software. An organizational fit/gap analysis is a comparison of the customer’s existing organizational model that supports the business to the defined organizational model supported (or assumed) by the ERP system.

Cisco launches Internet of Things security challenge

The "Internet of Things" is a concept aimed at making our devices, gadgets, appliances and transports all interconnected in the name of convenience and Big Data -- whether businesses want additional data on their customers or consumers want to control their appliances through their smartphones. From Starbucks coffee makers that update recipes automatically and track consumer preferences to connected cars, the IoT is already big business. However, if a cyberattacker is able to break in to one such system, they potentially can harm thousands of people with little effort.

Using Oracle Business Accelerators could speed up ERP deployment

Oracle Business Accelerators combine product-specific technology with industry expertise to streamline planning and setup and reduce risks during deployment. Based on region- and industry-specific best practices, Oracle Business Accelerators may allow midsize companies to quickly implement ERP without sacrificing functionality or incurring enterprise-size deployment costs.

Protecting Corporate Data in a UC and Cloud World

Security is widely cited as one of the biggest worries in enterprise use of cloud services, and at the same time it's becoming a major concern for communications shops that used to have less to worry about in this regard. I recently chatted with Jeff Graham, CEO of LayerX Technologies, a company that's come up with an interesting solution to the challenge of hosted UC security. Jeff began by pointing out that, just as basic VOIP injected new security issues into the communications environment, by bringing in IP infrastructure threats like denial of service attacks, the challenges are only going to get deeper over time: The whole philosophy of Communications-Enabled Business Processes (CEBP) involves integrating communications with business applications, thus raising the concern that breaching the security of the communications system could threaten another whole level of the enterprise system.

6 reasons why shadow IT is emerging from the shadows

Shadow IT really isn't in the shadows anymore. Technology purchases and management are being done by non-IT managers and employees across the company, including executives. And, oh by the way, IT employees themselves.

The self-encrypting drive you may already own

SEDs have several advantages over host-based software encryption. No key mgmt No additional life cycle cost No disposal cost No performance impact Standardized Looks like a regular drive - no app changes needed. Even better, in many jurisdictions, drive encryption is a "safe harbor" against mandatory data breach notifications.

The self-encrypting drive you may already own

SEDs have several advantages over host-based software encryption. No key mgmt No additional life cycle cost No disposal cost No performance impact Standardized Looks like a regular drive - no app changes needed. Even better, in many jurisdictions, drive encryption is a "safe harbor" against mandatory data breach notifications.

Hackers Attack Snapchat To "Raise Awareness" About Security

"Security matters as much as user experience," say the white-hatted hackers, who are hoping their actions will force Snapchat to fix the hole. Barely a week ago, research group Gibson Security raised the issue by posting details of a potential security flaw which could reveal Snapchat users' phone numbers. My writing career has taken me all round the houses over the past decade and a half--from grumpy teens and hungover rock bands in the UK, where I was born, via celebrity interviews, health, tech and fashion in Madrid and Paris, before returning to London, where I now live.

Predictably, Snapchat user database maliciously exposed

The Snapchat accounts - even those marked 'private' - were exposed in a database hack that Snapchat knew about for four months, ignored, then told press last week was only "theoretical.". In the EU, a person's phone number is categorized as personal information, and falls under data protection laws. Responsible disclosure is dead Snapchat joins a long legacy of companies denying responsible disclosure by security researchers, only to be embarrassed when users become victims of the exact targeted attacks whose warnings went ignored.

Perceived Risks and Threats Posed by VoIP to Enterprise Networks ...

OTTAWA, ONTARIO--(Marketwired - Dec. 30, 2013) - VoIPshield, a global provider of Voice over Internet Protocol (VoIP) security solutions, announces third party confirmation that VoIP systems can create significant enterprise information security gaps. The resulting white paper, VoIP Security: More than Just IT Risk, points to a growing and serious situation whereby organizations must address their voice security risks.". "Threats can harm VoIP's operations by, for example, causing disruption to customer service, but they can also be a path for hackers to penetrate an enterprise's entire network.".

Kana Smooths the Wrinkles Out of Back-End Administration

Most of Kana's users have customers with multilingual requirements, noted Scott Hays, Kana's senior director of product marketing, and new language support in this latest upgrade makes it easier to replicate knowledge across different markets. Earlier this year the company released a version with enhancements aimed at the end user, but "our focus this time around was on a different set of users," Scott Hays, Kana's senior director of product marketing, told CRM Buyer. Among these features are several new out-of-the-box reports as well as several metrics to rate performance.

CRMnext Releases Advanced Widget Control Functionality on Its ...

# 1 private cloud CRM software, releases advanced widget control functionality to provide a single interaction point for the direct manipulation of searches and validations for multiple records. It will help in ensuring that appropriate security answers are provided by customers before allowing access to create or view information related to existing records.

How SMB employees feel about their tech resources

Mobile technology such as smartphones, tablets and notebooks improves how your employees feel about their jobs: about 75 percent of them appreciate being able to work everywhere. All of these findings are part of research sponsored by GFI Software, called the 2013 State of the Small Business Employee Report. The survey included 1,119 employees from companies with two to 99 employees, polled by research organization GfK Group during late September and early October.

Target confirms breach: 40 million accounts affected

Target on Thursday confirmed that its payment card data was compromised in its stores with 40 million accounts affected. The retailer was confirming a report Wednesday that the breach had occurred. Customer name, credit or debit card number, and the card’s expiration date and CVV (the three-digit security code) were breached, according to a letter to customers.