What Are Botnets & How Can You Protect Yourself From Them?

Computer Security Tip of the Week

Scott Aurnou – Botnets are made up of computers infected with malware and forced to follow the commands of cyber criminals controlling them via the Internet.  Here’s what you can do to avoid being forced into one (or more)

Helpful websites referenced in this video include:
Secunia
FileHippo
AppFresh for Mac

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , ,
Posted in Laptops & Desktops, Security Tip of the Week, Smartphones & Tablets

Cloud Computing Security Needs: 7 Steps to Migrate to the Cloud

Cloud StaircaseBy Gilad Parann-Nissany

In 2008, the size of the cloud computing industry was $46 Billion. That is more than the GDP of Costa Rica! Think it’s a lot? Ready to jump on the cloud security bandwagon? That was 2008!

In 2014, the size of the cloud computing industry has more than tripled to $150 Billion – almost the GDP of New Zealand. NOW are you ready?

Besides the fact that everyone else is doing it, migrating to the cloud just makes good business sense. Whether you select a private cloud, a public cloud, or some hybrid of the two, cloud computing is just more powerful than traditional datacenters. There are several reasons for this. First, the reduced capital costs of IT infrastructure – no need for hardware, software, and manpower (and training) to manage them. Also, there is the improved accessibility, effectiveness, flexibility and scalability of the cloud.

But with great power comes great responsibility.

When migrating your business data to the cloud, you must ensure the safety and privacy of your records.

Much like data security was your responsibility in the datacenter, it continues to be your responsibility in the cloud. But, if you don’t know where your data is physically located can you still ensure its confidentiality?
Read more ›

Tagged with: , , , , , , , ,
Posted in Cloud Security, Guest Posts

Text Bombing – What Is It and How Can You Stop It?

Computer Security Tip of the Week

Scott Aurnou – Cyberbullying is an unfortunate reality today. One of the nastier forms of it is called “text bombing” and it has unfortunately been linked to a number of teen suicides. Learn more about it (and what you can do to stop it) here.

Websites referenced in this video include:
Text Bomb Defender
Anti SMS Bomber Pro
NumberCop

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , , , , ,
Posted in Security Tip of the Week, Smartphones & Tablets

NIST Unveils Cybersecurity Framework

NIST Logo - smallBy Roberta Anderson

On February 12th, the National Institute of Standards and Technology (NIST) released its long-anticipated Framework for Improving Critical Infrastructure Cybersecurity[1] together with a companion Roadmap for Improving Critical Infrastructure Cybersecurity. The Framework is issued in accordance with President Obama’s February 19 Executive Order 13636, Improving Critical Infrastructure Cybersecurity Version 1.0., which tasked NIST with developing a cost-effective Framework “to reduce cyber risks to critical infrastructure.”  The companion Roadmap discusses NIST’s next steps with the Framework and identifies key areas of development, alignment of cybersecurity standards and practices within the U.S. and globally and collaboration with private and public sector organizations and standards- developing organizations.

The Framework applies to organizations in critical infrastructure.[2] But, given the pervasiveness of cybersecurity incidents, and the ever-present, increasing, and evolving cyber risk threat, all organizations should consider whether their current cybersecurity risk management practices would pass muster under the Framework. In addition, although the Framework is “voluntary”—at least so far—organizations are advised to keep in mind that creative class action plaintiffs (and even some regulators) may nevertheless assert that the Framework provides a “de facto” standard for cybersecurity and risk management even for non critical infrastructure organizations. One thing that companies should consider as they review the Framework is what “Tier” of cybersecurity risk management they wish to achieve. The Tiers—which range from “informal, reactive” responses to “agile and risk-informed” are addressed below, together with an overview of the Framework and additional detail regarding certain of its key aspects.
Read more ›

Tagged with: , , , ,
Posted in Guest Posts, Network Security

What is CryptoLocker & How Can You Protect Yourself From It?

Scott Aurnou – CryptoLocker is a type of “ransomware” that encrypts the data on an infected computer so that it can’t be read and then demands payment to decrypt it. This clip discusses how to safeguard your computer against it and what to do if CryptoLocker strikes.

Helpful websites referenced in this video include:
Secunia
FileHippo
AppFresh for Mac

This clip is taken from the CLE course Data Confidentiality, Security & Recent Changes to the ABA Model Rules.

Tagged with: , , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops