Top 3 Guides for IT Audit

The topic of IT security is becoming more important in the IT world today as the number of security risks, cyber-attacks, data leakage incidents and court proceedings, investigations and following violation settlements increases. In most cases attacks are quite difficult to predict and to notice, and it’s usually very hard to recover from a missed attack. This is … Continued

How to Steal a Virtual Machine in Three Easy Steps

This last week, a thread in Spiceworks discussed a rogue sys admin that had come back to haunt this company. I read through the different threads and one in particular jumped out at me: “You people sound like a bunch of cops. Don’t you trust anyone? In order to trust someone, you must be trustworthy yourself.” … Continued

Backoff Malware: “Unsophisticated” But Effective

Look, I’m not trying to scare you, although I don’t think it’s a bad idea to be a little scared about the current threat level from data breaches. The Backoff malware that’s suspected to be behind most of the big headline breaches over the past year is generally described as not very sophisticated—yet criminals have … Continued

PCI Breaches Keep Coming Despite Increased PCI DSS Requirements

In this electronic age, most of us worry about privacy. We all have information which we don’t want to get into the wrong hands. Some say if you don’t do anything wrong, privacy shouldn’t be a concern, but of course that isn’t true. It’s not just tales of indiscretions that we want to keep secret; it’s … Continued