Norman Safeground Blogs

insight, opinion & information

 
 

Monthly Archives: February 2012

Windows 8′s Killer Feature: The Killswitch

If you knew Microsoft could remotely remove software from your computer, would you feel safer or more concerned? Inside Microsoft’s new Windows 8 Metro operating system, a “killswitch” could do just that. The killswitch is an increasingly popular piece of technology that allows companies to remotely remove software from your … Read More

Information is Power

You may have heard the saying, “Information is power.” This is especially true when it comes to securing your network. When your network is breached, the attacker has information about your network that you do not. The attacker is aware of some vulnerability or flaw that allows them to gain … Read More

Why You Should Use A Random PIN

There’s safety in numbers – but only if your PIN isn’t your birthday or one of 100 commonly used examples. In fact, according to research by Cambridge University, using your birthday means that there’s an 8.9% chance a stranger could guess your PIN in three attempts. This means that if … Read More

Top Five Tips To Keep Your Computer Secure

If your house was like your computer, it wouldn’t come with locks and you could be burgled from thousands of miles away. Obviously, you’d secure your castle before moving in – so why don’t we do the same for computers? Here are our top five computer security tips that’ll help … Read More

SCADA Environments Lack Sufficient Information Security

The technicians at a local chemical manufacturing plant have discovered that a virus has disabled their temperature monitoring controls. Although they are unsure of when the virus compromised the systems, they do know several vats are overheating. Alarms are signaling that an immediate evacuation is required. The warning isn’t limited … Read More

How To Manage Security Threats Related To Employee Behavior

Humans, sometimes referred to as wetware by security insiders, are a major source of enterprise security vulnerabilities. Cyber criminals regularly target employees and temporary workers with malware and social engineering attacks to breach security defenses and gain access to private information. You might assume that as technology savvy twenty-somethings fill … Read More

How To Minimize The Risk Of Indirect Attacks

Life isn’t fair and neither is security. You follow best practices. You have well defined policies for data protection. All of your endpoints are secure. You can go ahead and take those extra vacation days you rolled over last year, right? Not a chance. Even if you have done everything … Read More

Is You Data Security Disappearing Into the Clouds?

Personal cloud services are popping up like spring weeds. Services like DropBox, Box.net, iCloud, Amazon Cloud Drive and soon Windows 8 (via SkyDrive) entice users with promises of free storage and accessibility from everywhere on every device, and utilization of these services is continuing to expand. According to Forrester, personal … Read More

Spear-Phishing: Spam Gets Personal

We’ve spoke about “phishing” – a malicious attempt to steal your personal details – on here before. But have you heard about “spear-phishing”? It’s an e-mail technique that makes spam personal. Traditional phishing methods work on volume. By spamming hundreds of thousands of people with phishing e-mails, a tiny percentage … Read More

How to Erase Your iPhone/Android/Blackberry/Windows Smartphone

Everyone loves a new mobile phone. And most people like to do something with their old cell – sell it, give it to a family member or recycle it. One thing that might stop you from passing your handset on, however, is not knowing how to delete your private data. … Read More

Norman's Bloggers

Norman Safeground Blogs Archive