Menu

e-bay Security Practices under investigation by US States      

Biggest ever Distributed Denial of Service (DDoS) attack on Cloudfare Networks       

Bitcoin Exchanges continue to suspended withdrawal operations      

Snowden accessed NSA confidential data using web scrapping tools      

Barclays Bank probing the breach of client data sold to rogue City traders      

New Snapchat Flaw Can DoS and Spam iOS and Android       

Q: What are some standard computer industry security best practices?

Published on: 2/7/2014

A: In answering this question we are extremely pleased to pass along technology and security know-how to you in this article. Here are some standard computer industry security best practices for you to consider. Install a Firewall Security Appliance. Security Appliances are special devices at the edge of your network that monitor the activity of external connections, primarily the Internet, to an internal network. Firewalls help to eliminate the threat of any undetected external activity, and safeguard your network and connections from outside vulnerabilities. Store all sensitive or confidential information separate on trusted computers or servers. Customer information in particular, such as credit card details, should be stored in a secure database on a server that is not connected to the Internet. It is also highly recommended to encrypt all stored information. Use good Anti-virus software and update it regularly. Anti-virus software is another important way to protect your network and computer systems from outside vulnerabilities. Anti Virus definitions should be updated on a regular basis. Regularly download and install security updates. For server and individual computer operating system software, you can optimize performance and systems protection by maintaining compatibility with service and security updates. Remember also to reinstall service and security updates when reinstalling software. Avoid file sharing. Share access to network drives and individual computers only with needed, trustworthy users. Especially avoid sharing access to files that store passwords and other confidential or sensitive information. From shared folders remove the Everyone group. Avoid idle Internet connections. Disconnect when you are finished using the Internet. This also eliminates the possibility of undetected outside vulnerabilities.

Snowden accessed NSA confidential data using web scrapping tools

A senior intelligence official at NSA disclosed that Mr. Edward J. Snowden used very low cost web crawling tools to scraped data from NSA documents. Note that NSA have top grade security to protect against outside attacks and also responsible for protecting nation's sensitive military and intelligence computer systems from cyberattacks.
Read More

Possible misuse and loss of customer data at Barclays Bank

A whistleblower at Barclays bank raised the issue for possibility of data loss and subsequent misuse of approx. 27,000 files containing detailed personal data of Barclays customers and potential customers. The files may have reached in the hands of 'spank shops.'
Read More

How Ransomware turns your computer into a bitcoin miner

Linkup is the latest ransomware asking victims for a payment to undo damage to their computers. Security researchers have identified a new type of “ransomware” which blocks internet access and turns users’ computer into a bitcoin miner pending payment of a ransom. The malware, named by researchers at Emsisoft as “Trojan-Ransom.Win32.Linkup”, differs from previous examples of ransomware. “It does not directly lock your computer or encrypt files,”...
Read More

2014 New Year Resolution: Disaster Recovery

Looking back, I can see at least three different New Year’s resolutions that I totally failed, but as CIO of a Tech Support Company, failure really isn’t an option. I am talking about backup and disaster recovery. Our failure means our client’s failure, and we won’t stand for that. In order to avoid failure in the disaster recovery area, it’s always best to plan ahead - and the beginning of a new year is one of the best times to do so. Please tak...
Read More