This past September, Apple quietly removed several antimalware tools from the Mac App Store. Developed by security firm Trend Micro, the tools were part of the Adware Doctor app, and worked in the background to collect data about their users’ browsing history, uploading that data to a remote server. What’s particularly surprising (and concerning) is that these weren’t small, independently-developed apps.
Today, I’ll be starting things off with an analogy. I’d like you to picture two castles The first belongs to an incredibly rich duke who has spared no expense on his keep’s physical security – nigh-impenetrable walls, a wealth of traps to trip up attackers, and reinforced gates. Having spent so much on making his keep secure, he figures he needn’t bother with his guards.
Most companies fail at cybersecurity. And not for lack of trying, either. Decision-makers understand the importance of taking steps to protect their data.
Your website is something of a digital first impression – the first interaction many prospective customers will have with your business. What that means is that if it’s poorly-designed it’s going to drive away people who might otherwise become loyal to your brand. Unfortunately, there are a lot of ways you can go wrong.
CentOS is among the most secure Linux distributions, at least among distributions that are useful on a server. It is a stable, reliable, and secure platform. But every server distribution requires some input from the administrator to ensure that it is as secure as possible.
Online retailers can choose to self-host an eCommerce application or use a hosted platform. Both provide the foundations on which eCommerce businesses are built: a connection to the internet, a shopping cart, product pages, and a content management system. But that’s where the similarities end.
The internet is vast and complex, and so we use simplifying metaphors to describe it. They cut the internet down to a size that fits in our heads. The internet is a place we visit. It’s a web. It’s a cloud. It used to be an information superhighway. The true nature of the internet is in its name: the internet. The internet is an interconnected network, a network of networks. As it moves from point to point across the internet, information may traverse many networks.
Digital infrastructure is far-reaching, and employees have access to more tools and power than ever before. The days when cybersecurity could be handed off to the IT department and only brought up at an occasional board meeting are far behind us. For businesses to effectively protect their systems and data, cybersecurity needs to be organization-wide.
I’d like to start today’s piece off with a story.
Today, I’d like to focus on something a little different from our usual fare. It might not be the kind of thing you’re used to reading from me, but it’s nevertheless a topic that impacts everyone – including IT professionals. I’m talking, of course, about social media.