Mobile Security

We all have them, resting there in our pockets, laying around close to you or even in your hand right now. That’s right, it’s your mobile devices. These devices seem essential now. It seems like we can’t live without them anymore. They seem to dictate what we do daily. Mobile devices are clearly an important innovation and a token of the forward progress of technology. As it may seem, mobile devices can be a person’s best friend, but also their worst nightmare. You might ask “why are they our worst nightmare if you have said all of these great things about them?” Well, as you see, technology that is created always has a good positive side to it, while it also has a negative side to it as well, and mobile devices are no different. What we have on us is potentially a life changing device or a diamond mine for attackers. As we do more and more things on our devices like online banking, sending corporate emails, using our devices to pay for items because we stored our credit card information on it, etc., we find ourselves less protected than ever before. This is because of the amount of personal data found on our mobile devices are not protected as much as they should. After reading this article, I hope to help you be more aware of the security of your mobile device, how you can protect your device and what to stay away from. 

Continue reading

Advertisements

Continuous Diagnostics and Mitigation

Every day, we connect to networks to get into databases, different webpages and other such things without us even knowing it. For example, when we start up our phones and use the internet on them, send text messages, and make calls, we use a network that has been set up by a mobile carrier. Another example is when we go to work and use a computer located in the work place. The computers all located in our workplace are connected to a network. You can access information from the workplace’s data base or communicate to other computers that are connected to this network. These instances aren’t any different when we move up into the government level. The government uses networks to do about the same thing we do and more. These government networks are highly protected and secured because they hold sensitive information. Since we all use networks, they need to be protected highly just like our data. There are many ways one could secure a network. A business could use firewalls, strong encryption and so on. However, the government uses all those basis ways, but they also have a method to securing their network. The government uses Continuous Diagnostics and Mitigation (CDMs) to secure networks and the systems in their position.  

Continue reading

Security Information and Event Management

Target, Equifax, Wendy’s, what do all these companies have in common? They are different yet, they all have experienced the same thing. That is right, all these companies have experienced a breach in their security resulting in millions of credit cards, social security numbers and other personal information being exposed on the internet. I am sure that many of you have heard of these security breaches on the news, in a paper, or on other social media outlets. The breaches were the top headliner on many different news outlets for days on end and rightfully so. After each type of these incidents reported, I am always left wondering to myself, “could they have possibly done more to protect our information?” As are living in the aftermath of what is regarded as the digital explosion, more and more of our personal information is being stored in big data bases and not in locked filing cabinets. Our world has changed and so have we. We have accepted the fact that our information will be on the internet whether it being our choice to put it there or not. Because of this reality, our businesses today must continue to be progressive in cyber security. This could be installing the latest version of an OS, or making sure that they use strong encryption methods, or following good password creation. However, one of the best ways to improve this area is with Security Information and Event Management.

Continue reading

Collaborative solutions for Cybersecurity challenges

Gone are the days when a cybersecurity threat was mostly aimed at an unsuspecting individual or a group of gullible people. For example, if an individual’s bank account and credit cards were compromised, the impact was mostly financial and it was felt by the affected individual and their families. In one study by the US Government Accountability Office (GAO), the number of incidents experienced by federal agencies increased by 680 percent in a 6 year period. If Government systems with reasonable controls and security measures see such a drastic rise in threats, it is a no-brainer to guess the increase in the volume of attacks on individual computer systems. Nowadays it is not uncommon for large corporations and government agencies to be relentlessly targeted by hackers to gain access to sensitive information, to conduct large scale fraudulent financial transactions or control computer systems in a way that could harm millions of people.

Continue reading