IT security issues plague businesses of all sizes — even the smallest organizations fall victim to hacker attacks, malware, phishing attacks and other security threats. Organizations should stay abreast of these risks and arm themselves with information on how to protect critical systems and data. That’s why Atlantic-IT.net has put together this IT Security Resources Center. As your outsourced IT department, we are here to help businesses in New Jersey and New York maintain robust security and ensure compliance with industry and government regulations. Remember: Security is not just the responsibility of IT. Everyone in the organization plays a role in preventing a security breach. We invite you to read through these resources and contact us if you need further assistance.
eBay has fallen victim to a security breach, announcing last week that hackers infiltrated its systems in February or March and stole the customer names, passwords, email and physical addresses, phone numbers, and birth dates associated with “a large number of accounts.” eBay is recommending that customers change their passwords immediately.
The fallout from the Heartbleed bug has brought renewed attention to the issue of passwords. Despite ever-more-sophisticated security threats, the humble password remains a first line of defense for your systems and network. It is absolutely essential that everyone in your organization use strong passwords and follow password best practices.
How does an organization balance its security imperatives against user access needs in this era of distributed and open networked systems?
There is only one foolproof way to protect your networked computer systems against electronic snooping, hackers, unauthorized access, stolen passwords, denial-of-service attacks and other security breaches. Unplug them.
There’s no question that wireless LANs (WLANs) offer compelling benefits in terms of mobility and productivity. WLAN security can be problematic, however, preventing organizations from fully reaping the rewards of wireless.
iPhone and iPad users are prime targets for all kinds of criminals – not just hackers, but also thieves looking to physically steal these devices. Instead of camping out overnight in front of an Apple store to get their hands on the newest model, they’d rather let you do the waiting and get their hands on yours.
According to the National Small Business Association’s 2013 Small Business Technology Survey, 44 percent of small business owners have been the victim of a cyber attack with an average cost per attack of $8,700. The majority of attacks were resolved within three days, but 12 percent took more than a week for organizations to recover.
As the world waits to see which country will offer asylum to NSA (National Security Agency) leaker Edward Snowden, many CIOs and IT security managers are nervously reviewing their internal security policies. Snowden, who worked as a system administrator for an NSA contractor, has cast doubt on the trust placed in IT staff.
P.T. Barnum claimed that there’s a sucker born every minute, and he may have been right. Hackers frequently get hold of sensitive information or gain unauthorized access privileges simply by manipulating insiders — a technique known as “social engineering.”
Right before Christmas, thieves dampened the holiday spirits of millions of consumers when they hacked into Target’s IT systems. The breach exposed the credit and debit card numbers, PINs, email addresses and other data of as many as 70 million Target customers. Target itself could face billions of dollars in fines, not to mention a public relations nightmare and loss of consumer trust.