This Valentines Day you could be left with wonderful memories and a hard to remove Trojan on your computer. Many anti-virus vendors are issuing warnings about a new malware distribution scheme that targets those celebrating Valentine’s Day. It is the Win32/Waledac worm in a new form being distributed via spammed web pages that prompts users to select a cute Valentine’s heart. In doing so they … [Read more...]
ISACA Releases the Risk IT Framework Draft
ISACA, the Information Systems Audit and Control Association has just released an exposure draft of of their initiative “Enterprise Risk: Identify, Govern and Manage IT Risk, The Risk IT Framework”. Covering 94 pages the document frames IT risk as a business risk and goes into extensive detail on a framework for dealing with it. Packed full of charts, tables and control framework. Though not a … [Read more...]
IBM Internet Security Systems Expands Services
With increasing cyber threats, IBM is introducing new identify and access management services, work with strategic partners and offer a complimentary comprehensive financial assessment of security infrastructure management costs. Today, IBM announced a set of actions to bolster its security solutions that can help clients save costs while navigating the "perfect storm" of security threats … [Read more...]
Microsoft and EMC Team to Help Secure Sensitive Data
Building on a long-standing, multifaceted alliance, EMC and Microsoft Corp. today announced they have expanded their technology partnership to help companies better protect sensitive information and share it in a more secure manner. The companies will be working together with a built-in “systems” approach that helps protect information throughout the infrastructure based on content, context and … [Read more...]
What the Economic Crisis Means for IT Security and Risk Management
EMA has issued a new advisory that highlights emerging threats in IT Security and Risk Management due to the financial crisis. Including the anticipation of new compliance issues (W3D), "What Washington Will Do". SOX emerged from a downturn. Enterprise Management Associates (EMA), a leading IT management research and consulting firm has released a new advisory note titled, “What the Economic … [Read more...]
DeviceLock Protects Data by Managing Peripheral Device Access
Firewalls and antivirus software are no defense against acts of data theft and corruption from within your organization at local endpoints. You don't have to be an administrator to connect a small digital camera, MP3 player, or flash memory stick to the USB and begin uploading or downloading whatever you want. If you are a system administrator, you know you can't manage such device-level activity … [Read more...]
IronKey The Worlds Most Secure USB Thumb Drive
What do you keep on your USB thumb drive? Project information, company information, client files, personal data? If you have data you want to protect with military grade encryption in a rugged USB thumb drive, take a look at the IronKey lineup of USB drives. Three Versions IronKey USB thumb drives come in a variety of sizes from 1 GB to 8 GB. You can pick from three versions depending on … [Read more...]
IT Security Challenges For Small Business
A recent survey conducted by McAfee revealed that 52% of small and medium sized businesses felt they were too small to be of any value to cyber criminals and that they were adequately protected by default security settings. For example: 35% of SMBs are ”not concerned” about being a target for cyber crime 52% don't think they are well known enough to be a target for cyber criminals 45% … [Read more...]