Skip to main content

Home/ Corliss Tech Review Group/ Group items tagged risks

Rss Feed Group items tagged

The Corliss Review Group: Five Myths About Cloud Privacy - 2 views

started by Queeniey Corliss on 27 Mar 14 no follow-up yet

Corliss Group Review Android devices await Heartbleed fix - 2 views

started by Queeniey Corliss on 17 Apr 14 no follow-up yet

The Corliss Review Group: IT Leaders' Forum - 1 views

started by Queeniey Corliss on 29 Mar 14 no follow-up yet
1More

5 File Sharing Dangers by the Corliss Group Tech Review - 1 views

  •  
    Sharing files with colleagues and clients should be easy and convenient. What it shouldn't be is a security risk - but it frequently is. Because many small businesses don't have the right file-sharing systems and policies, many turn to unsafe practices that often put both their business's and clients' privacy in jeopardy. Is your business guilty of engaging in dangerous file sharing habits? Here are five you need to watch out for and what you can do about them. 1. Sharing files via email The most obvious dangerous habit is sharing files via email. Just the other day I received a design document from a client as an email attachment. 2. Using consumer-grade cloud solutions Workers around the world are putting themselves and their employers at risk by indiscriminately using unauthorized file sharing services on their mobile and desktop devices - to the tune of $2 billion. With more workers joining the bring-your-own-device (BYOD) revolution and turning to insecure file sharing services like personal Dropbox and Google Drive accounts, the threat is greater than ever. 3. Peer-to-peer (P2P) file sharing P2P sharing is a great technology used to share data over peer networks. It's also great software to get hacked. 4. Using flash drives Flash drives are the easy tool of choice for infection since they bypass network security. If an infected file is on a flash drive and inserted into a system, it can start an infection spread from the PC. 5. Lack of visibility The danger starts when employees take matters into their own hands and engage a file sharing service on their own. The individual making a one-off decision is not going to be thinking of the bigger picture of organization-wide requirements.

The Corliss Group Latest Tech Review: The Internet Is Burning - 1 views

started by Grace Wilson on 26 May 14 no follow-up yet
1More

Corliss Group Tech Review: Dating App Tinder Infected by Dangerous Bots - 1 views

  •  
    Swipe right, chat to a fake user and your personal data could be stolen. A series of bots have invaded dating app Tinder and are spreading dangerous downloads after luring users with tempting profiles and pictures, an antivirus developer has discovered. Bitdefender Labs is currently investigating both the Android application and the bots that seem to have stolen pictures from an Arizona-based photography studio. Some of these images are also being used for fake Facebook profiles. Catalin Cosoi, chief security strategist at Bitdefender, said: "After users swipe the right button on Tinder to indicate that they like a profile, the bots engage users in automated conversations until they convince them to click on a dubious link. "The name of the URL gives the impression of an official page of the dating app and for extra legitimacy scammers also registered it on a reputable .com domain." Bitdefender warns users to be aware of this risk, and advises that a typical bot message reads: "Hey, how are you doing? I'm still recovering from last night? Relaxing with a game on my phone, castle clash. Have you heard about it? Play with me and you may get my phone number."
1 - 19 of 19
Showing 20 items per page