I was on the phone the other day with a member of the education community asking – at large – “what are our steps to ‘becoming secure’?” All of a sudden, panic struck me. Did I lock my front door? Does my Gmail password contain a child, pet or street name? Do I use the same 4 digit PIN on my iPhone as I do on my MasterCard? That’s where my head’s at – and I’m just one person.
‘Tis the season to be jolly! We wanted to share the 5 best seasonal posts about security to help everyone stay safe because this is, unfortunately, also the season where Cyber criminals take advantage of unsuspecting people. So let’s make data protection a priority, and end this year on a high note.
Today is Black Friday. Many retail stores in North American have customers lining up outside for hours to get the best deals. In 2015, 74.2 million people shopped on this day for your great deals! And around 30% of annual retail sales happen during the Black Friday through Boxing Day season, according to the National Retail Federation. With all this excitement of dropping prices and advertising to invite consumers to your stores, you are also potentially inviting cyber criminals that have been waiting for an opportunity to get information on your consumer data.
Can you remember the last time you installed security updates at work? If the answer to that question is “no,” that’s a big problem. Patches and updates protect computers from dangerous threats. Read on to learn why installing security updates across your corporate network can save your firm from disaster.
Last week at Black Hat in Las Vegas, IT security firm Imperva discussed a “man-in-the-middle” attack that affects certain enterprise file-sync-and-share (EFSS) services, allowing hackers access to files transferred into the cloud. This is a very relevant and interesting vector of attack for EFSS services.
Wireless encryption is a security tool to protect a company’s network. The word “encryption” means to turn something into code. When IT professionals use wireless encryption, they are encoding the messages sent between a computer’s wireless adapter and a wireless router.
The term “data at rest” refers to data in computer storage. Its opposite is data in motion, which is a phrase used to describe data traversing a network. It can even apply to information temporarily residing in a computer’s memory.
In August 2014, the digital security company Websense released a report stating that more than one-third of Canadian IT professionals knew for certain that their company’s data had been the victim of a serious breach.
In what is beginning to appear as a weekly occurrence, another major retailer has announced they have been a victim of a data breach. Late last week, Sears-owned discount department store Kmart, quietly announced via a Securities and Exchange Commission filing that the brand had suffered a breach through its point of sale (PoS) systems which were ultimately comprised by malicious software.
At WinMagic data protection is our strong suit and we often talk about it on this blog. At the same time it’s good to remember that ensuring security of data at rest using encryption and strong key management are just two important aspects of the larger picture of data security. In my next few posts I’d like to expand on other challenges an enterprise faces as part of the larger picture, the solutions and technologies that address those challenges and their potential links to encryption and key management.
Last week we announced upcoming improvements to SecureDoc that we plan to deliver in the April timeframe. These enhancements include support for BitLocker and TCG Enterprise drives and we’re really excited about the value these new solutions will ultimately deliver to customers.
TPMs have been shipping for nearly 8 years now. WinMagic was an early adopter and supported TPM version 1.1 for full disk encryption before most. We expanded our support to the more main stream version 1.2 TPMs when they started shipping. Now more than 100 Million TPMs are out there in laptops and other devices, and soon many, many Version 2.0 TPMs will join them. TPM 2.0 and disk encryption will be a good topic for a future blog but today I am going to set the ground work on where we are today.