Tech Insights

rss

Contributor Columns on Information Technology and Security

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s ...

There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed. Recently, hackers got into the White House, State Department and the Office of Personnel Management, ...

Enterprise resource planning (ERP) is perhaps one of the most boasted-about inventions that cater to the modern enterprise. It rightfully earns this title because of its uncanny ability to boost the efficiency of businesses and provide the needed visibility to make quicker and better-informed decisions in virtually every department. ...

McCormick & Company, most well-known for its spices and seasoning mixes, has been around since 1889. And yet, this Fortune 1000 firm that got its start in the 19th century is a prime example of a 21st century digital business. Aiming to reach digital consumers, in 2013 McCormick introduced ...

A good customer base is a small company’s most valuable asset. Customer retention is one of the major drivers of a company’s growth and plays an important role in establishing a reliable bottom line. In fact, Gartner Research just revealed that 80% of a company’s initial revenue comes from 20% of its ...

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced: One allows criminals to run an arbitrary code on a vulnerable computer/device, and the other allows man-in-the-middle attacks. A more famous openSSL vulnerability that made headlines earlier this year is the Heartbleed bug. Might ...

Don’t think in terms of “if” you’ll suffer a data breach, but rather, “when.” Once you establish this mindset, it’s time for you to develop a response plan. After all, a security system that’s impenetrable has yet to be invented. What’s even more, an amazing number of businesses don’t even ...

Being a DBA in today’s world can be hard. Really hard. Not only are the daily challenges growing as businesses rely more and more on applications to engage with their customers, there are several technical and cultural shifts that are putting enormous pressure on “traditional” DBAs to change how ...

In this age of advanced technologies, there seems to be no limit to where we can go and what we can do on the Internet. Still, in navigating the worldwide web we make ourselves vulnerable to cyber crimes committed by those bent on using the Internet for illegal and ...

When it comes to protecting an organization’s information, flaws with this can involve either implementing strong technology to protect too much trivial data, or inadequate protection of important and sensitive data. In short, not enough attention is cast upon a company’s most important information; there’s a gap between the IT ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its