You are viewing 'wi-fi'

The Risk of Wearable Tech

A Cyber Security Risk on Your Wrist?

Jacob Faires

June 02, 2016 - Posted by Jacob Faires to Security Insight

Rise of Wearable Tech Technology has come a long way in the last decade.

Smartphones in the ‘90s, outside of Nokia’s N series, weren’t even a thing. Wearable devices were a leftover trend from ‘80s cyberpunk. Images resembling those depicted in Snow Crash and Neuromancer were things of the imagination, but are now becoming part of daily life. “Goggling in” referenced in Snow Crash is a reality made possible by the new rise in virtual reality products like the HTC Vive and Oculus Rift. People are already carrying around what essentially amounts... read more >

Stop, Think, then (Carefully) Connect

Reminders of Important Cybersecurity Basics

Bob Bybee

October 02, 2015 - Posted by Bob Bybee to Security Insight

Blog

During this first week of National Cyber Security Awareness Month (NCSAM), the theme is STOP. THINK. CONNECT.™ This year marks the fifth anniversary of this global cybersecurity awareness campaign to help all digital citizens stay safer and more secure online. A coalition of private companies, non-profits and government organizations, with leadership provided by the National Cyber Security Alliance (NCSA) and the Anti-Phishing Working Group (APWG), developed STOP. THINK. CONNECT. to provide a unified message for online safety. The STOP. THINK. CONNECT. website contains a large number of resources targeted toward different groups, from kids to senior citizens, businesspersons to business owners, to help everyone become more... read more >

Retail Needs to Take a Lesson From...Retail

Protecting Credit Card Data and Meeting PCI DSS Requirements

Brian Drexler

February 05, 2015 - Posted by Brian Drexler to Security Insight

POS

Have you ever walked into a grocery store and found the milk on a shelf next to the mustard? Or while walking the seemingly endless aisles of a supermarket and seen the ice cream next to ice scrapers?

Unless some mischievous kids were having fun, the answer is “of course not.” There's an almost perfect order to the retail store layout, even if it is a bit overwhelming.

Does this look like segmentation?

Sure does.

Not only are the dairy products kept in a somewhat contained area, they are also refrigerated and protected. Do you think it's a coincidence that high-value items like jewelry and electronics are in central locations with lots of lights and minimal visual barriers?

Of course not.

This is done by design. These valuable items are prone to theft so they require an elevated level of visibility and additional protection to safeguard them. Many items are locked away and can only be accessed by... read more >

Rethinking Information Security

Donovan Farrow

January 29, 2015 - Posted by Donovan Farrow to Security Insight

information security

Each day we go to our favorite Internet feed to read about the latest cyberattacks. A majority of these reports tell the story of a “scary attacker” that broke into a corporation, damaging all aspects of the company’s digital information and reputation. The stories go further into detail about how the attacks are brand new and one of the most “sophisticated” that the experts had ever seen.

This information leads me to share a conversation I had with a vice president of a (multi-billion dollar) company. This opportunity allowed me to present to an entire executive committee of the company and speak on the topic of information security. I gave the usual breakdown; expressing the importance of security layering, hardware and software recommendations and information security techniques. After about an hour of me yammering, it was time for... read more >

Mobile Device Security Tips

Nine Tips For Your Holiday Gifts

Chad Kahl

November 25, 2014 - Posted by Chad Kahl to Security Insight

mobile device security

Welcome! Welcome, one and all!

With Black Friday just around the corner, there is no doubt the holiday shopping season is upon us. For many, myself included, new phone FTW! This means a myriad of new electronic gadgets and gizmos.

Considering you are reading the Solutionary Minds blog, it stands to reason that you care about security. And because I've started setting up my new phone, it seems like a good time to discuss mobile device security.

The tips below apply primarily to phones, tablets and phablets (phones that are too big to be a normal phone and too small to be a true tablet), but many of these tips can help you protect laptops and other devices as well. The list certainly should not be considered all-inclusive, but applying it is a strong step in the right direction.

Nine Tips for Mobile Device Security

1. Enable Total-Device Encryption

Despite the ... read more >

1 | 2 | 3 | 4 | Older Entries >>

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)

LATEST TWEETS