It’s August 5, 2016 and you settle down at your computer to watch the Olympic opening ceremony. You have no fear of catching Zika, unlike the thousands of people in Rio. Feeling safe, you navigate to the official broadcast site of the games and click on Watch the Olympics live. But wait, there’s fine print: Simply Sign-In Using Your TV Provider Account Login/Password And You’ll Have Access To FREE, LIVE Rio Olympics Coverage.
FacebookTwitterGoogle+LinkedIn
One of the most frightening IT nightmares is hearing employees say their mobile devices or laptops were lost or stolen. Cyber-attacks and mobile threats are at the highest they ever been and will continue soar. Customers large and small face cyber espionage. Today, at SonicWall Security PEAK16 – “Come for Knowledge.
FacebookTwitterGoogle+LinkedIn
Today, we are so excited to be here at the Grand Hotel Excelsior in Valetta, Malta with more than 230 of our security-focused partners, for the annual SonicWall Security EMEA PEAK16 conference. This is SonicWall Security’s opportunity to affirm our commitment to our channel partners and to work together to protect our customers.
FacebookTwitterGoogle+LinkedIn
Most of us would reach into a cookie jar full of delicious, just-out-of-the-oven, chocolate chip cookies without a care in the world, or any doubt that we should simply enjoy the euphoric chocolaty goodness. But what about germs? Did everyone wash their hands before reaching into the jar? What soap did they use?
FacebookTwitterGoogle+LinkedIn
One of my first customers in IT was a large retailer, with more than a thousand stores. This was at a time when e-commerce was just beginning, at least for large, traditional retailers. Giving their customers the ability to purchase on the web was still a year or two away. This retailer made about 90 percent of its annual revenue between Thanksgiving and New Year’s Day.
FacebookTwitterGoogle+LinkedIn
Network firewalls have evolved from 1st generation simple packet filters to advanced devices that evolve so fast that labeling them as “next-generation (NG)” is the best way to classify them. They are often defined by the services that are attached to them and one of the greatest and newest internet security technologies to service today’s firewall is the sandbox.
FacebookTwitterGoogle+LinkedIn
In medieval times, people relied heavily on physical security to protect their critical assets. Originally they had castles with walls and as attackers figured out how to breach those walls they added moats and draw bridges and murder holes to keep the advanced attackers out. But all of these hardened physical security measures designed to keep people out had the unfortunate side effect of making it difficult for people to get in, which in turn interfered with business and commerce.
FacebookTwitterGoogle+LinkedIn
The following is a guest post. Eamon Moore is Managing Director of EMIT, an Irish IT solutions company and SonicWall Security Preferred Partner specialising in IT Consultancy, Cloud Computing, IT Security & IT infrastructure solutions. At EMIT, providing innovative security solutions that allow our customers to both achieve and surpass their goals has become a core part of what we do.
FacebookTwitterGoogle+LinkedIn
In survey after survey, IT executives continue to say that security is one of the top challenges they face. No one has to tell us about the risks. The stories of data theft and breaches are in the media every day. We are intimidated by the rapidly changing threat environment. New malware is being written every day and some of it is being written using a variety of methods that defeat existing security technologies.
FacebookTwitterGoogle+LinkedIn
Businessman reading in an airport terminal
I started this year speaking and writing about how retail establishments can protect themselves from the rising tide of malware. I continue this train of thought by considering the Payment Card Industry Data Security Standard (PCI-DSS) as a general guidance to protect any small business. Instead of looking at PCI-DSS as guidelines for protecting cardholder data, consider it as guidance for protecting any critical data.
FacebookTwitterGoogle+LinkedIn