Archive for August, 2014

Time-Tested Data Security Equation: Out-of-Date Software + Hackers = Disaster

The case of FTC v. Wyndham Worldwide Corp. is a good case study for what not to do in the rapidly changing world of data security. We will share some thoughts about the case in an upcoming blog. But for now, I want to quickly address one allegation from the case because it serves to highlight a point made in an earlier blog post. (more)

Using Technology and People to Help Protect Against Data Breaches

Most of us in the data security industry know that a data breach is the most common and costly data security failure for a company of any size. We also know that we have technology to help prevent these attacks—e.g., encryption, firewalls, network monitoring, etc. But if you are waiting for technology alone to solve all your issues, then as my favorite rock group of all time would say, “Dream On”.   It’s true that technology is getting smarter, but this can be undermined when your employees are not trained to play defense. Protecting data systems requires both the technical and human elements to be synchronized. (more)

Data Monitoring: Do It or Face the Ugly Consequences

Our data security experts here at bTrade want to let our readers know of a breaking story in the world of data security. News outlets are reporting that Russian crime figures have illegally obtained more than a billion stolen Internet credentials. According to data security firm, the stolen credentials include 1.2 billion password and username combinations and more than 500 million email addresses. (more)

Web Design BangladeshBangladesh Online Market