All You Need
In One Single
Theme.
Search here:

Blog

Home > Blog (Page 18)

New security liabilities: The Internet of ThingsIn previous blogs we have addressed the data security concerns that arise out of the inherent nature of IoT. However, there are other factors that create new security concerns.First, since many of these devices were designed to solve specific LOB needs, they may be designed for functionality first and security a distant second. And in many cases, they may not be designed with the capacity to restrict access to the data that is collected....

What is the Internet of Things?It is hard to avoid hearing about the Internet of Things. Articles in the mainstream business media appear frequently in print and online, and even consumers are becoming aware of it now. So let’s dive in and quickly define the Internet of Things. First, it is important to understand that the IoT is not a specific product. You don't buy a box of “internet things.” The IoT refers to all of the things that are...

The Internet of Things: A new security risk?You may have heard about the Internet of Things (IoT), but are you aware that your business is already connected to it in some way?Everyday thousands and thousands of things are being connected to the Internet for all sorts of purposes. In the consumer and residential world, we are connecting thermostats, temperature sensors, lighting systems, security cameras, baby monitors, appliances and door locks, just to name a few. Conveniences we take for granted...

Website cloning: Don’t fall for that trap!Have you watched one of those horror movies where the something impersonates the protagonist only to wreak havoc later? Well, website cloning does the same thing--to your business--in real life. Website cloning is one of the most popular methods among scammers to fleece you of your money.As the name suggests, the cybercriminal first creates a ‘clone’ site of the original one. There can be a clone of any website, though retail shopping sites, travel...

BYOD=Bring your own disaster?Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are you or your employees take a break from the break to reply to those important emails that require ‘immediate action’. Plus, there may even be employees who are not even on the same continent as you. What does all this mean for your business in terms of IT security? Does BYOD translate to...