You are viewing 'data security'

Stay Safe this Holiday Season

You’re a Mean One, Mr. Grinch

Zach Holt

November 22, 2016 - Posted by Zach Holt to Security Insight

Holiday Scams Ahead

It’s that time of year again where the days grow shorter, the wind starts picking up, and the temperatures start dropping (and if you’re one of my neighbors, it also means swapping your Halloween decorations for Christmas lights. But I digress). The holiday season is just around the corner, and so are opportunities to ruin your holiday cheer. With a little caution, you can save yourself from a big headache. Below are my top tips on how to stay safe this holiday season:

  • Virtual credit cards – If you’re tech-savvy enough to be reading this blog, there’s a good chance you’re familiar with online shopping. Many credit cards come with an option to generate a short-term virtual credit card number associated with your main account. While we would all like to believe our information is safe with big name companies,...

read more >

Top Ten Ways to Fight Ransomware with Backups

Your Backup Strategy Can Minimize the Risk

Bob Bybee

June 09, 2016 - Posted by Bob Bybee to Security Insight

Ransomware Note

Ransomware is grabbing a lot of security news headlines these days, not necessarily because it’s worse than other types of malware, but perhaps because it’s more annoying. Older malware might simply have erased your hard drive.  Ransomware encrypts it, saying “your data is still here, but you can’t have it.” To add insult to injury, it then tells you to pay a ransom “or else.”

Of course, paying the ransom is no guarantee that your data will be recovered. Once a system is infected with ransomware, there is no sure way to recover all of the data. But a robust backup strategy can get you most of the way back, and that’s a lot better than nothing. It’s hard to believe that large organizations or government offices have been caught without adequate backups, but it has happened to hospital groups, law firms, police departments, and even NASA (see links at the end of this... read more >

eSymposium: Privacy and Security

Zach Holt

May 19, 2016 - Posted by Zach Holt to

Privacy and Security

These days, it’s difficult to discuss security without mentioning privacy. As the amount of data being collected on everything from social media to advertising to medical records shows no signs of stopping, commercial entities and malicious actors alike increasingly look to these information gold mines as sources of data ripe for the taking. The use of this information can be leveraged in a number of ways, from simple customer demographics to highly targeted advertising campaigns, or even something more malicious. After all, wouldn’t a mailing list of recently hacked retailers make for some potentially vulnerable users?

After pondering on that thought for a moment, it may come as no surprise that the average user is becoming increasingly concerned about their privacy. A recent study by the... read more >

eSymposium: Tackling Vulnerabilities

Zach Holt

May 03, 2016 - Posted by Zach Holt to Security Insight

Tackling Vulnerability Management

As an organization’s security posture grows, a number of responsibilities may fall under the umbrella of information security, whether it is under direct control of an information security program or delegated to another supporting IT department. One such responsibility is a vulnerable management program.

Vulnerability management is an important part of a matured information security program. At a high level, the objective of vulnerability management is to find and remediate all issues as they are identified. However, as you start examining the matter in-depth, you’ll find that you:

  • Need to have a process in place to determine priorities
  • Need to have more information than what a vulnerability scanner can provide
  • Won’t always be able to fix vulnerabilities; fix what you can and mitigate the rest

As with any good story, we’ll leave that last item for a bit and focus on the top two for now. After all,... read more >

Prevention Blog Series

Patch Your Network: A Third Step in Security

Loren Paquette

April 21, 2016 - Posted by Loren Paquette to Security Insight

Ounce of Prevention

This blog is a continuation of the Prevention blog series. The first blog, "Four Tips to Secure Your Network," discussed prevention and four tips to use to immediately help secure your network. The second blog, "Scan Your Network: A First Step in Security," was the first of four steps to assist with security, and discussed ways to scan your network. The third blog, "Secure Your Network: A Second Step in Security," covered the second step with ways to secure your network. This fourth blog will discuss the third step and how to patch your network. Links to the other blogs will be provided as they are... read more >

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS