Sears using spyware for sales
No secret that Walmart is hurting many older retail chains such as Kmart and Sears. Both latter companies are struggling to stay afloat, trimming the fat by closing locations and restructuring current stores to look refreshed and up to speed with America’s #1 retail giant. But now Sears and Kmart has come under fire for […]
Research data integrity
I usually write about best practices and practical tools to prevent data theft, data loss and data leakage – since our professional services focus on data security in Central and Eastern Europe. Data security is, I guess a sub-specialty of security and compliance. Security is chartered with ensuring the survival of a business and protecting […]
Data loss prevention at work – video and porn
Bahya ibn Paquda was the author of the first Jewish system of ethics written in Arabic in 1040 under the title Al Hidayah ila Faraid al-Qulub, Guide to the Duties of the Heart. In his view, most people acted in accord with selfish, worldly motives. This was almost 2,000 years ago before the age of […]
Eating your own dog food
People often ask me to help them find jobs.Often, the answer is that it’s time to go out on your own, start a new career in a non-technology field, doing something you love and do well. But sometimes, I suggest improving interview skills in order to improve the chances of getting hired. After having given […]
Better physical security with more eyeballs
Big companies have lobbies and receptionists. They may have many visitors during the day not to mention messengers from FedEx, DHL, TNT, Poczta etc. A DHL courier recently visited the offices of a client to pick up a package. He walked in, picked up 5 expensive mobile computers and notebooks, put them in the pouch […]
Social media cell phone
The newspapers this morning online and print, had a number of items citing how Obama won in the social networking space – au contraire – Obama won the election because he sold Americans a message of hope, even if it was modeled on a character from the TV Series “24”, The majority of Americans are […]
Misguided Security
I recently signed up on the ANSI Web site to download a document on cyber risk calculation and they had a minimum 10 character password requirement – they also share your personal data (all demographics are required fields by the way) with third parties – at least they have an opt-out check box on the […]
When should you encrypt email?
A while back, a colleague asked me what is the best way to encrypt internal email. My first question to him was – what is the threat, who is the attacker and what is the asset you are protecting? Are you trying to encrypt business communications between employees and vendors/customers to protect from eavesdroppers or […]
Automated hacking of Joomla Web sites
A lot has been written about Google-aided automation of hacking. There is little I can add to this topic besides some personal and practical advice. If you’re running Joomla 1.5 you may have noticed queries of the sort “powered by joomla .domain_name_extension” in your Apache access.log file. It’s almost certain you’ll find a few of […]