Skip to main content

Home/ Corliss Tech Review Group/ Group items matching "Security" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle

The Corliss Review Group: Five Myths About Cloud Privacy - 2 views

started by Queeniey Corliss on 27 Mar 14 no follow-up yet
1More

The Corliss Group Latest Tech Review - Us Regulator To Impose New Cyber Security Standa... - 1 views

shared by Queeniey Corliss on 14 Apr 15 - No Cached
  •  
    A new report highlighting deficiencies in US banks' oversight of suppliers' cyber security should serve to remind financial services companies in Europe of the due diligence they need to undertake, an expert has said.
1More

5 File Sharing Dangers by the Corliss Group Tech Review - 1 views

  •  
    Sharing files with colleagues and clients should be easy and convenient. What it shouldn't be is a security risk - but it frequently is. Because many small businesses don't have the right file-sharing systems and policies, many turn to unsafe practices that often put both their business's and clients' privacy in jeopardy. Is your business guilty of engaging in dangerous file sharing habits? Here are five you need to watch out for and what you can do about them. 1. Sharing files via email The most obvious dangerous habit is sharing files via email. Just the other day I received a design document from a client as an email attachment. 2. Using consumer-grade cloud solutions Workers around the world are putting themselves and their employers at risk by indiscriminately using unauthorized file sharing services on their mobile and desktop devices - to the tune of $2 billion. With more workers joining the bring-your-own-device (BYOD) revolution and turning to insecure file sharing services like personal Dropbox and Google Drive accounts, the threat is greater than ever. 3. Peer-to-peer (P2P) file sharing P2P sharing is a great technology used to share data over peer networks. It's also great software to get hacked. 4. Using flash drives Flash drives are the easy tool of choice for infection since they bypass network security. If an infected file is on a flash drive and inserted into a system, it can start an infection spread from the PC. 5. Lack of visibility The danger starts when employees take matters into their own hands and engage a file sharing service on their own. The individual making a one-off decision is not going to be thinking of the bigger picture of organization-wide requirements.

The Corliss Review Group: IT Leaders' Forum - 1 views

started by Queeniey Corliss on 29 Mar 14 no follow-up yet

Corliss Review Group: Om oss - 1 views

started by Queeniey Corliss on 03 Jan 14 no follow-up yet
1More

Corliss Group Tech Review: Dating App Tinder Infected by Dangerous Bots - 1 views

  •  
    Swipe right, chat to a fake user and your personal data could be stolen. A series of bots have invaded dating app Tinder and are spreading dangerous downloads after luring users with tempting profiles and pictures, an antivirus developer has discovered. Bitdefender Labs is currently investigating both the Android application and the bots that seem to have stolen pictures from an Arizona-based photography studio. Some of these images are also being used for fake Facebook profiles. Catalin Cosoi, chief security strategist at Bitdefender, said: "After users swipe the right button on Tinder to indicate that they like a profile, the bots engage users in automated conversations until they convince them to click on a dubious link. "The name of the URL gives the impression of an official page of the dating app and for extra legitimacy scammers also registered it on a reputable .com domain." Bitdefender warns users to be aware of this risk, and advises that a typical bot message reads: "Hey, how are you doing? I'm still recovering from last night? Relaxing with a game on my phone, castle clash. Have you heard about it? Play with me and you may get my phone number."
1More

Corliss Group Tech Review on which is better: AVG vs. Avast? - 1 views

  •  
    Protecting yourself against harmful and life threatening viruses, its best to choose the antivirus by brand name. But each Antivirus download that you can find on the internet is dependent on what is most important to the user in terms of variables. Some are more dedicated to filtering through malware and spyware; some systems pride themselves on being the most reliable, or adaptable to the constant change of cyberspace gunk that's floating around. So with all these choices, how're we supposed to know which program is suited to our professional needs? We hope to address those concerns and point the potential onlooker in the right direction for a potential download, or perhaps full-on purchase of the bundled software. For the moment we'll be looking at Avast! and AVG which are both free antivirus downloads available for your computer on reliable online websites. Avast! Free Antivirus Software: The Basics Chances are if you're looking to get in on the ground floor to check if Avast! is right for you, then you'll be looking into the coverage that the free antivirus download is going to offer. Avast! is ranked as one of the top antivirus programs in the market with 17% of users in the entire market share of protection services. Which is pretty far up there with McAfee, Bitdefender, and other potential competition. AVG Antivirus Software: The Basics In comparison to Avast! the folks at AVG are a little behind in their numbers at 170 million+ having entrusted their computer's health to the program. But the software itself is secure and accessible on their website. AVG have won an array of awards for their antivirus software, and can be considered a lively competitor to Avast! and other protection bundles.

Hus Cyber Informasjonsdeling Bills: Right Approach men Krev Løser - 1 views

started by Enzo Brocato on 15 Apr 15 no follow-up yet
‹ Previous 21 - 40 of 40
Showing 20 items per page