By

admin
Malware spent almost 6 months stealing the credit card information of customers at The Buckle, Inc. The Buckle is a clothing chain that operates 450 stores throughout the US. And it turns out that their Point of Sale (POS) system got hacked. While The Buckle is not sharing any information about how this happened, there...
Read More
This article (5 risky suppliers to watch using cognitive computing) makes some good points. But, let’s be honest about Target. While it’s true that they were compromised through a vendor, the REAL problem was that they were incredibly lax in their security practices.  You can vet your vendors all you like, but it won’t help...
Read More
While the storm this past Tuesday didn’t hit New York City as hard as expected, some areas were very badly hit. And even in areas where there was a relatively low accumulation of snow, travel conditions were treacherous. In fact, New York City stayed in a state of emergency till midnight, because travel was so...
Read More
You’ve thought long and hard about all of the things that could go wrong. It can get pretty depressing. The good part is that you can now get on with figuring out how to make things better. And, there is a lot you can do. There are three areas that are at the heart of...
Read More
In “Infrastructure under attack: The next ransomware wave” Infoworld explores the next wave of ransomware – attacks on infrastructure. It’s a very scary thought. We’ve seen many attacks on medical facilities. At best, these attacks have been expensive and disruptive to these organizations. And, they have had the potential to threaten the lives of patients....
Read More
It was a typical busy morning when Skender got a call from James Morgan, Administrator at MMC (Modern Managed Carers) Nursing home. He got straight to the point. “I’ve heard that you guys might be able to help us. Our network is a mess and we need someone to fix it. And we need this...
Read More
Keeping yourself safe from internet threats is not easy. Fortunately, there is a lot you can do, but if you want to be reasonably safe, there are a lot of different bases that need to be covered. Fortunately, years ago Google decided to help out. And, for the last 11 years, they have been operating...
Read More
Disaster recovery and “high availability” are not the same thing. But, when you plan for infrastructure improvements and maintenance it can be worthwhile to think of them together. Why? Mostly, because both issues require the same mind set. Also, because the two work together and often share infrastructure. Both disaster recovery planning and high availability...
Read More
One of the most common questions entrepreneurs face when starting a business is deciding whether to host all of their computing and storage needs in the cloud or on premises. So, if you find yourself asking this question, you are not alone. There is no short answer. It depends on several factors, such as the...
Read More
When an organization posts a scam alert on their home page, you know that they must have gotten a lot of inquiries and complaints about the matter. That’s why The Global Privacy Enforcement Network has posted an alert at the top of their home page https://www.privacyenforcement.net/. According to the FTC, people are getting calls ostensibly...
Read More
1 2