There’s an old saying in IT: The best way to secure a server is to leave it off.
Speaking recently in a Google webcast, U.S. CIO Tony Scott declared major cloud providers like Google, Amazon or Microsoft just as secure as the world’s largest financial institutions. He even implied that there’s no safer place to store data than in the cloud.
It’s wonderful to see federal agencies revitalizing their cybersecurity efforts by prioritizing a move to the cloud. Continue Reading
As you may know, Ashley Madison — a website that connects users to engage in extramarital affairs — was hacked on July 15, 2015. Several days later, the hacking group, called “Impact Team,” released a small amount of personal data on users after the site was not shut down according to the hackers’ demands. Later in August, the hackers sent out another larger file full of user information — totaling 32 million users whose information was leaked. Continue Reading
Wikileaks has published a handful of documents it says come from the private emails of CIA director John Brennan. Though the organisation has not explained where it obtained the documents, the release comes just a matter of days after someone claiming to be a 13-year-old “stoner” said they had hacked Brennan’s personal AOL email.
The Wikileaks files don’t include actual email correspondence, but files of interest obtained from personal email accounts belonging to Brennan. Continue Reading
By Mr. Bryan Bell
Faculty Member, School of STEM at American Military University
So where do we begin?
With all the breaches and compromises in the news, cybersecurity best practices must be emphasized more than ever. So what are they? How does the typical home user know what to use or do…for that matter? Most large businesses have the adequate infrastructure, personnel and knowledge to implement basic cybersecurity, but for the small business or home consumer, this is lacking. Continue Reading