Do your PCs leak valuable intel with every Windows error report?

Do your PCs leak valuable intel with every Windows error report?

Anyone familiar with any version of Microsoft Windows is largely desensitized to the reality of occasional crashes. These range from process failures you never see to Windows Explorer shutdowns that cause all your icons to be jolted back into existence after your desktop flashes back to life. Behind the scenes, a process called Windows Error…

Did the NSA Deal Fatally Damage the RSA Brand?

Did the NSA Deal Fatally Damage the RSA Brand?

Secrecy is not a poor security practice as much as a compromise of integrity. EMC’s RSA Security division recently made headlines when its enterprise products were expertly hacked, undermining the security of thousands of organizations globally and embarrassing the industry pioneer. The company, whose illustrious founders – Ron Rivest, Adi Shamir and Leonard Adleman – are rock stars in the security industry. It…

(Why You Should Develop) A Passion for (Protecting) the Intangible

(Why You Should Develop) A Passion for (Protecting) the Intangible

People often confuse information protection with IT security. One of the reasons I resist the compartmentalization of my craft as an automated, software driven process is that as important as it is, IT security not only reduces the scope of my work by at least two-thirds, but it misses the point of what it means…

Are online banking apps, mobile ransomware a match made in cybercrime heaven?

Are online banking apps, mobile ransomware a match made in cybercrime heaven?

In a recent report, antivirus software maker McAfee (now safely in Intel’s hands and no longer related to notorious troublemaker/troubadour John McAfee) reports a vast increase in the number of unique instances of ransomware for mobile phones. If the thought of losing access to your data gets your attention, having your smartphone commandeered by cybercriminals on…

Take a Walk on The Wild Side The Social Dynamics of Online Anonymity  Most of us find the size of the Internet and the Web’s rate of expansion more than a little overwhelming, so we rarely have an opportunity to think about ‘what else might be out there’. Most people are also vaguely aware that there…

Does anti-virus software make things worse?

Does anti-virus software make things worse?

According to the handy Wolfram Alpha search engine, some 24.5 years have passed since the introduction of the first Internet virus. And the first self-replicating malware to exist on the Internet’s precursor, the ARPANET had already made waves in 1971, itself practically forced into existence by the fertile imagination of science-fiction writers of the previous decade in…

3 Low-Cost Keys to Getting Big Companies to Trust You

3 Low-Cost Keys to Getting Big Companies to Trust You

f you’ve ever rolled your eyes after hearing a prospective client say, “No one ever got fired for buying IBM,” you know how it feels to be a small fish in a big pond. Any SME that aspires to sell to big companies knows about their almost instinctive preference for buying from other big companies. One…

Don’t Get Screwed By Your Security Cameras

Don’t Get Screwed By Your Security Cameras

It’s ironic that most companies use video surveillance cameras to watch for trouble, not realizing that improper use of these cameras could get a company into trouble. A recent study at the University of Toronto concluded that the vast majority of Canadian businesses operating security cameras do so with little regard for federal privacy legislation. Although the…

Suspect a Privacy Breach? Here’s Why You Shouldn’t Clam Up!

Suspect a Privacy Breach? Here’s Why You Shouldn’t Clam Up!

The impact of a privacy breaches in Canada primarily focuses on the damage caused to the individual whose information was compromised and the resulting reputational impact on the business reporting the breach. But there are much better reasons to report suspected breaches of security or privacy to the authorities than just the fear of damaging…