Security

ComputerWorldIndependent

Microsoft kills off security bulletins after several stays

Credit to Author: Gregg Keizer| Date: Wed, 12 Apr 2017 13:21:00 -0700

Microsoft this week retired the security bulletins that for decades have described each month’s slate of vulnerabilities and accompanying patches for customers — especially administrators responsible for companies’ IT operations.

One patch expert reported on the change for his team. “It was like trying to relearn how to walk, run and ride a bike, all at the same time,” said Chris Goettl, product manager with patch management vendor Ivanti.

The move to a bulletin-less Patch Tuesday brought an end to months of Microsoft talk about killing the bulletins that included an aborted attempt to toss them.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Crafty Ohio inmates scavenged parts, built PCs for hacking and hid them in ceiling

Credit to Author: Darlene Storm| Date: Wed, 12 Apr 2017 06:51:00 -0700

What can a computer recycle program and a little shoulder-surfing get you? For inmates at Ohio’s Marion Correctional Institution, it got them a great deal, enough to build two PCs from the yanked parts and then hide them in the ceiling, use a former employee’s credentials obtained by looking over his shoulder, and then commit “possible identity fraud along with other possible cyber-crimes.”

The Ohio Inspector General’s 50-page report (pdf) includes a big list of fails for the Ohio Department of Rehabilitation and Correction. The report reads like a mini novel of intrigue, weaving lax security as well as players across the prison system and prisoners into the story.  

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Credit to Author: Ira Winkler| Date: Wed, 12 Apr 2017 04:00:00 -0700

When I served on a panel about data breaches at the ISACA Silicon Valley chapter conference recently, the moderator asked, “To prevent data breaches, which is more important: process, technology or people?”

My fellow panelists (three CISOs and two highly experienced consultants) all answered ahead of me: “People.” I was surprised. Here I was the only awareness specialist on the panel, yet my answer was process.

Without process, I explained, the people don’t know what to do. Without process, there is no right way to implement technology. Process is implemented through governance. As I discuss in Advanced Persistent Security, without governance your security program is an accident.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

7 tips to strengthen online security

Credit to Author: Ryan Francis| Date: Wed, 12 Apr 2017 04:00:00 -0700

Seeing the light
online security

Image by Pexels

A lightbulb. We can connect a lightbulb in our house to the internet in case we need to turn the lights on or off while we’re away – or if we’re too lazy to walk to the light switch. The more lightbulbs, devices, apps and online services we use and connect with on a daily basis, the more we expose ourselves to security risks. This is the nature of how our digital lives have evolved and it requires more active participation as individuals to protect ourselves and minimize exposure.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Hacked Dallas sirens get extra encryption to fend off future attacks

Credit to Author: Matt Hamblen| Date: Tue, 11 Apr 2017 14:37:00 -0700

Read More