Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.
From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among businesses. In fact, it is almost impossible to find a company’s data center that does not employ cloud-based services of some kind.
It’s been said so many times that many small business owners are likely to block it out, but the truth remains: cyber criminals target SMBs. Perhaps the reason for this ignorance is that when an SMB falls victim to an online attack, it’s not breaking news.
A security alert has been released for DRUPAL web sites. Drupal is one of the top 3 CMS (content management systems) for websites. These vulnerabilities have not been found in Joomla and WordPress (the other top 2 CMS’s). One of the issue vulnerabilities are found in the update process and allow hackers to upload “poisoned” content to the server or even take over the server.
Vulnerabilities in the web-based version of popular instant messaging app WhatsApp recently left up to 200 million users exposed to hackers and malware. The bug was picked up by an Israeli IT security firm, and WhatsApp put a fix in place before news of the potential threat spread.
While many small businesses mistakenly think they’re immune to data breaches because of their size, and therefore put minimum protection in place, healthcare organizations can’t ever risk taking this laissez-faire approach – and they’d be in trouble if they did.
Medical institutions rely on their healthcare systems to facilitate the needs of their patients, whether through electronic medical records, prescription management or data entry software. Unfortunately, most healthcare service providers don’t realize how vulnerable their IT systems are to cyber attacks.