Not sure which way to go? I have the answers…

2015 Planning: BCP – Phase 3 – Determination and Mitigation!

2015 Planning:  BCP – Phase 3 – Determination and Mitigation!

Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined.  Phase 3 is what the whole BCP is made of, essentially.  In this phase, all of the planning, relationship information and real analysis take place.  For each disaster scenario defined in...

Security Best Practices – 10 of the best things you can do

Security Best Practices – 10 of the best things you can do

Corporate security consumes a huge chunk of time, money, and human resources. It’s no wonder that companies like Symantec exist. Symantec produces some of the security industry’s best software, but its contribution doesn’t stop there. Symantec also produces an annual Internet Security Threat Report. In these reports, Symantec highlights...

Pay Up….You’ve been Hacked!

Pay Up….You’ve been Hacked!

It nearly sounds as if it’s out of a movie. Picture it: You boot up your computer, only to discover that all your files have disappeared — and a stranger is holding them hostage until you fork over some dough. It’s one of the latest threats to your network and unlike many cyber threats, the culprits are literally taunting you over what’s been done....

Windows RT vs Windows 8: On the Surface, there’s still a lot of confusion

Windows RT vs Windows 8: On the Surface, there’s still a lot of confusion

Microsoft Surface has been popular enough for pre-orders to sell out but there’s continuing confusion among users and IT pros about what the Windows RT operating system it runs is and what the OS does. When Apple first announced the iPhone, it initially claimed that it ran OS X. While iOS shares some important technologies with the Mac operating system,...

Is it April Fool’s Day? ….Nope, that’s malware attacking your printer

Is it April Fool’s Day? ….Nope, that’s malware attacking your printer

We all run into standard printer frustrations. The inevitable ‘paper jam’ or ‘ink too low,’ when it’s clear there is plenty enough ink left to print your one page document. Let’s be honest, it wouldn’t be a Monday without it. But lately, it’s been security analysts who have been called to the printer rescue instead of the intern. Security analysts everywhere...

Exploiting VoIP for Toll Fraud – Don’t get slapped with someone else’s long distance calls!

Exploiting VoIP for Toll Fraud – Don’t get slapped with someone else’s long distance calls!

We’ve all been there…a quick glance at the monthly phone bill, followed by a second and then the long stare and a raising of the eye brows. ‘Did I really talk for that long?’ ‘He was in Singapore on that call!?! A majority of the time, it’s a slight increase in the monthly bill that draws initial skepticism. But, when the monthly phone bill jumps up to the same...

Banking Trojans – You won’t spot them until it’s too late.

Banking Trojans – You won’t spot them until it’s too late.

There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account… Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. The problem? The bad guys get as many attempts as they want and the bank only has to fail once before millions can be lost...

BCP – Phase 3 – Determination and Mitigation!

BCP – Phase 3 – Determination and Mitigation!

Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined.  Phase 3 is what the whole BCP is made of, essentially.  In this phase, all of the planning, relationship information and real analysis take place.  For each disaster scenario defined in...

Spotlight on your bank account…yes, YOUR bank account

Spotlight on your bank account…yes, YOUR bank account

Spotlight on your bank account…yes, YOUR bank account There’s a race occurring daily and it’s as competitive as any competition imaginable. What’s at stake you ask? Your bank account. Cybercriminals are hard at work, chipping away at any form of protection you or your bank can throw at them. Its all in the numbers..The bad guys get as many attempts as they want...

Email and Network Security – a home run approach – cover your bases!

Email and Network Security – a home run approach – cover your bases!

Email security is one of those things that most IT departments are not sure about how to do right. Right, is up to interpretation, though thorough is something that can be more easily attained. I will go over my Home Run approach to securing email in this post. As you may have guessed, the Home Run approach consists of 4 bases of security to cover, to further...

When Email Goes Wrong – Protect Yourself, Your Data and Your Reputation

When Email Goes Wrong – Protect Yourself, Your Data and Your Reputation

I don’t know about you, but I will only assume a few things, and one of them is that you must hate junk email, viruses, SPAM and anything that can endanger the availability and integrity of company information.  Let’s face it, in today’s technology world email and digital communications are the prime ways you reach your customers, and...

BCP – Phase 3 – Determination and Mitigation!

BCP – Phase 3 – Determination and Mitigation!

Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined.  Phase 3 is what the whole BCP is made of, essentially.  In this phase, all of the planning, relationship information and real analysis take place.  For each disaster scenario defined in...