What Is Open Source Software?


Computer Security Tip of the Week

Scott Aurnou – Open source software is free and its underlying source code is available to the public to analyze, use or modify. A number of popular programs are open source.

Websites referenced in this video include:
Linux
Firefox
KeePass
TrueCrypt

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , , ,
Posted in Network Security, Security Tip of the Week

Data Breach? The Best First Responder is a Law Firm. Seriously.

Keep Calm and Call a Lawyer (white)By Scott Aurnou

News reports and articles concerning high profile data breaches have been hard to miss in recent months. The highly publicized cyber attacks against Target, Neiman Marcus and Las Vegas Sands are just a taste of what’s to come.

As you might expect, a data breach – high profile or not – can be a nasty surprise to deal with. In addition to potentially negative publicity (sometimes very negative), there are often significant costs associated with a breach. These include forensic analysis of the victimized organization’s electronic systems to figure out what happened, taking steps to fix the problem, notifying clients/customers that their data has been potentially compromised, possible statutory fines, and extra costs like credit monitoring services for the affected clients and/or customers and engaging public relations and crisis management firms to try and mitigate the damage done to the organization’s brand.

Upon discovery of a data breach, it may seem natural for an organization to contact forensics and security experts (and possibly other vendors) immediately in an effort to sort out the inevitable problems ahead. But that’s actually a mistake. A breached organization’s first call should be to an outside law firm with cybersecurity expertise. Doing so can greatly mitigate an organization’s ultimate exposure, not only by ensuring that the seemingly endless patchwork of state, federal and perhaps international laws are properly addressed, but also for two critical and frequently overlooked reasons: (1) attorney client privilege; and (2) the work product protection.
Read more ›

Tagged with: , , , , , , ,
Posted in Network Security

What Are Botnets & How Can You Protect Yourself From Them?

Computer Security Tip of the Week

Scott Aurnou – Botnets are made up of computers infected with malware and forced to follow the commands of cyber criminals controlling them via the Internet.  Here’s what you can do to avoid being forced into one (or more)

Helpful websites referenced in this video include:
Secunia
FileHippo
AppFresh for Mac

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , ,
Posted in Laptops & Desktops, Security Tip of the Week, Smartphones & Tablets

Cloud Computing Security Needs: 7 Steps to Migrate to the Cloud

Cloud StaircaseBy Gilad Parann-Nissany

In 2008, the size of the cloud computing industry was $46 Billion. That is more than the GDP of Costa Rica! Think it’s a lot? Ready to jump on the cloud security bandwagon? That was 2008!

In 2014, the size of the cloud computing industry has more than tripled to $150 Billion – almost the GDP of New Zealand. NOW are you ready?

Besides the fact that everyone else is doing it, migrating to the cloud just makes good business sense. Whether you select a private cloud, a public cloud, or some hybrid of the two, cloud computing is just more powerful than traditional datacenters. There are several reasons for this. First, the reduced capital costs of IT infrastructure – no need for hardware, software, and manpower (and training) to manage them. Also, there is the improved accessibility, effectiveness, flexibility and scalability of the cloud.

But with great power comes great responsibility.

When migrating your business data to the cloud, you must ensure the safety and privacy of your records.

Much like data security was your responsibility in the datacenter, it continues to be your responsibility in the cloud. But, if you don’t know where your data is physically located can you still ensure its confidentiality?
Read more ›

Tagged with: , , , , , , , ,
Posted in Cloud Security, Guest Posts

Text Bombing – What Is It and How Can You Stop It?

Computer Security Tip of the Week

Scott Aurnou – Cyberbullying is an unfortunate reality today. One of the nastier forms of it is called “text bombing” and it has unfortunately been linked to a number of teen suicides. Learn more about it (and what you can do to stop it) here.

Websites referenced in this video include:
Text Bomb Defender
Anti SMS Bomber Pro
NumberCop

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel.

Tagged with: , , , , , , ,
Posted in Security Tip of the Week, Smartphones & Tablets
Twitter: saurnou
TheSecurityAdvocate Youtube Channel
Subscribe for updates to TheSecurityAdvocate