Real-world server room nightmares…

TechRepublic’s Real-world server room nightmares. Check out these pics! I feel good for what we do for our clients…

security solutions

security solutions

As computing has evolved, in the last 50 years, from facilitating only the core business processes to running every single process, the threats have multiplied to alarming levels.  Information Security is no longer optional.  It must be considered by any business, big or small.  Defense-in-depth, a term once only used in military context, today describes how we approach securing your information and computing assets.  A layering tactic, protection mechanisms, procedures and policies are put in place to increase the dependability of an IT system where multiple layers of defense prevent espionage and direct attacks against critical systems.

Using more than one of the following layers constitutes defense in depth: Physical security (e.g. doors and locks), Authentication and password security, Hashing passwords, Anti virus software, Firewalls (hardware or software), DMZ (demilitarized zones), IDS (intrusion detection systems), Packet filters, VPN (virtual private networks), Logging and auditing, Biometrics, Timed access control, Software/hardware not available to the public (but see also security through obscurity).

We provide solutions that secure your data and  infrastructure using multiple layers of industry standard tools.

Are you making money from your blog?

Are any of you making money from your blogs? Interesting infographic says a lot of you are.

The Economics of Cybercrime

The Economics of Cybercrime and the Law of Malware Probability. Great stats on underground malware economics.

Senate bill to require minimum cybersecurity standards for internet

RT @itsecnews: Infosecurity (US): Senate bill would require minimum cybersecurity standards for internet …

Latest Stuxnet variant uses encryption to evade analysis

Latest Stuxnet variant evermore capable. Ecrypted bot communication makes it near impossible to analyse how it’s working.

Passion is key to success in Social Media

Passion is key to success in social media. So true! Who is passionate about your company. Empower them!

Paying ransom for your… files.

New malware encrypts your files and demands cash to decrypt them. Recommendation: encrypt your kids before they can!

Touchless input device coming to a computer near you

Love it! Touchless gesture-based interface devices for entertainment, healthcare.  Swipe TV channels like ipod photos.

Image and audio files = attack vector

Didn’t know image, audio & video files were this exploitable. Check out “Malware goes to the movies”: Kudos @ayampolskiy