The Vulgarisation of IT System Hacking Could Be Good News
Attack sophistication is growing. 20 years ago, social engineering had already made inroads and automated attacks were on the rise, with denial-of-service, browser executable attacks, and techniques for uncovering vulnerabilities in the binary code of applications.
Dealing with Combined Mobile and Cloud IT Security Problems
Now that so many people and enterprises have rushed headlong into mobile, cloud, or both, it’s time to take a step back and consider your security posture relating to these two items.
IoT Device Security Doomsday on the Horizon?
Does it sound strange that many organisations believe they are exposed to major problems with Internet of Things device security, yet few of them have taken any measures to resolve those problems?
Are Routers Open Doors for Hackers?
Small businesses using low-end routers for their networks may be highly vulnerable to hackers.
IT Security and Strange Mobile App Permissions
If you have already installed mobile apps on your smartphone to go beyond the stock selection provided with the device, you may well have noticed how a mobile app asks for permission to access certain resources or take certain actions.
The Great Business Continuity Risk-Reward Mix-Up
Investors and financial institutions like to correlate business continuity risk with business continuity reward. If risk is greater in an investment, then the potential reward should be greater too.