Two years ago, Yahoo became the victim of the biggest known hack in Internet history. This is old news, except for one recent development – Yahoo claims to have just found out about it and reported that the access credentials of 500 million email accounts had been stolen!
Author Archives: Mylon Staton
How Secure is Your Meeting Room?
Corporate meeting rooms are commonly used for discussions that range from the mundane to the highly sensitive. Remote offices can be brought into these discussions with audio and video systems and applications that run over IP networks. Yet most meeting participants may be unaware that their conversations can be monitored by hackers, even when the AV equipment is not in use.
Cloud Firewalls Improve Security & Reliability
As organizations increasingly adopt virtualization, software defined networks and cloud applications, firewalls have been evolving from perimeter-based security devices to distributed security solutions.
Finance Sector Highly Susceptible to Data Breaches
According to a recent report issued by the risk assessment firm SecurityScorecard, the financial industry’s vulnerability to attacks should be a major concern among their customers and partners.
Tighten Security with Two-Factor Authentication
Almost every business is now connected to the Internet, which exposes them to virtually continuous attack. Consequently, users need to be concerned about the strength of their passwords and change them often to effectively protect company assets.
40% of Businesses Hit by Ransomware Attacks
Businesses are coming under increasing attack from ransomware – 40% have experienced a ransomware attack in the past year, with companies in the healthcare and financial services sectors getting hit the hardest, according to a new study from Malwarebytes and Osterman Research. Continue reading
Study Quantifies Benefits of Work Mobility
While past studies have recognized the impact of increased mobility on employee engagement, establishing business outcomes has been a missing link. The Economist Intelligence Unit quantifies these impacts in a recent study.
The global survey of 1,865 employees looked to define the key dimensions of a mobile-first employee experience, then demonstrate how each dimension contributes toward business performance. A number of key trends stood out… Continue reading
When Password Sharing Becomes a Federal Crime
It has been noted many times that employees are often the weak link when it comes to protecting the proprietary information of their employer. This includes the sharing of passwords, which can cause harm to a company and can become grounds for federal prosecution of violators under the Computer Fraud and Abuse Act (CFAA).
Worried About Hackers, Malware and IT Disasters?
Organizations today face a complex set of challenges. IT performance, security and disaster planning are all priorities. Not knowing where to look for problems and how to fix them can put your business at risk. DataLink can help…
Easing the Transition to Managed IT Services
The benefits of outsourcing the management of your IT to an experienced local provider are well known. In addition to cost savings, it can result in broader support with a larger pool of experts and technical resources than your organization would normally be able to afford. This lets your in-house IT team focus on strategic business issues that go right to the bottom line.