Aaron Weiss - Article Archives - Page 1

5 Tips to Protect Networks Against Shodan Searches

November 12, 2015
While Shodan isn't exactly "the scariest search engine on the Internet," it does present some security risks. Here is how to minimize them.
READ MORE

How to Minimize Enterprise File Sharing Risks

July 31, 2014
File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.
READ MORE

How to Protect PII

May 15, 2014
Personally identifiable information, or PII, is especially valuable to hackers. Here's how to make sure they don't get their hands on it.
READ MORE

Top Apps for Boosting Mobile Security

March 17, 2014
Carriers of both iOS and Android mobile devices can improve their mobile security with apps that offer help with password management, encryption and other security best practices.
READ MORE

How to Fight Malvertising Threat

February 18, 2014
Even security-conscious enterprises like Yahoo can be compromised by attacks in which ad servers are used to deliver malware. How can you fight this 'malvertising' threat?
READ MORE

How to Secure Digital Signatures

January 9, 2014
Hackers have found many ways to exploit digital certificates. What can you do to defend yourself against digital certificate risks?
READ MORE

Apple iOS7 Management vs. MDM

October 29, 2013
Though Apple has added MDM-like features to iOS7, many enterprises will find they still need third-party mobile device management solutions.
READ MORE

Lagging Updates Compound Java Risks

September 19, 2013
Most Windows-based devices are running Java 6. Oracle is no longer releasing patches for this version of the software, which makes machines running it vulnerable to security risks.
READ MORE

Workplace Surveillance Revisited

September 9, 2013
As revelations about the NSA's security program continue to come, it's a good time to discuss workplace surveillance and when and why it might be used.
READ MORE

Can Your Printer Put Your Whole Network at Risk?

August 19, 2013
It may not seem like a big deal if an attacker can hack into your printer. But attacks against embedded systems like printers can expose you to larger security risks.
READ MORE

Windows 8 Boosts Security with 5 New Features

August 13, 2013
Security experts have long held a dim opinion of the Microsoft Windows OS. But Windows 8's lineup of security features may help change their minds.
READ MORE

How to Defend Against Insider Threats

August 5, 2013
The Edward Snowden affair has made enterprises all too aware of insider threats to data. From policies to software, organizations can take action to mitigate such threats.
READ MORE

Android Malware: Separating Reality from Hype

July 12, 2013
Reports of Android malware are rampant. Should enterprises be worried?
READ MORE

How to Find and Track Mobile Devices

June 4, 2013
Mobile devices are great for productivity. For security, not so much. Enterprises can minimize security concerns by using location features and handy apps.
READ MORE

How to Protect Macs in the Enterprise

April 5, 2013
Mac OS X has developed a reputation for security – which means many people ignore measures they should take to secure Macs in the enterprise.
READ MORE

What Is Lurking in Log Files

March 14, 2013
A U.S. software programmer made headlines when he outsourced his own job to China. He probably never would have gotten away with it if his employer had been paying attention to its log files.
READ MORE

Cloud Security Standards: What You Should Know

March 12, 2013
A confusing collection of cloud security standards can make it tough to evaluate cloud provider security.
READ MORE

5 BYOD Risks and How to Manage Them

January 15, 2013
Mobile device management can help enterprises deal with BYOD. But there are other ways of minimizing BYOD risks as well.
READ MORE

Anatomy of a Hack: A Case Study

December 19, 2012
Avoiding hacks is perhaps the most essential responsibility for security organizations, which can learn some valuable lessons from this analysis of a real-life hack.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|