Month: December 2016
BY MARK JAMES POSTED 15 DEC 2016 – 12:00PM
Last night, Yahoo announced that yet another data breach has happened involving more than one billion of its user accounts.
As breaches seem to be happening more and more these days we can be forgiven for allowing data breach news to fall on deaf ears but we need to get this in perspective …
This data breach supposedly happened in 2013 and according to Internet Live Stats, the internet users worldwide amounted to just over 2.7 billion. Yahoo states that over one billion user accounts were compromised, that’s over a third of the total internet users at the time.
For perspective, just imagine as you’re walking down the street every third person you see has had their details stolen and are now accessible on the internet.
So what can you do about the breach? NOTHING! Sorry, but it’s true, there is nothing you can do about that particular data breach but you can try and limit any further damage as a result of your data going missing.
Whenever headlines like this make the news normally the first thing you read is “change your passwords”. It’s becoming the “go to” statement but it’s a very valid point and one that should be your default first move for any account that’s involved in a data breach.
”WHEN YOUR DATA IS STOLEN, PURCHASED, HACKED OR TRADED, YOUR DETAILS MAY BE USED TO GAIN ACCESS TO OTHER ACCOUNTS OR LOGINS.”
When your data is stolen, purchased, hacked or traded, your details may be used to gain access to other accounts or logins. Changing those compromised passwords and any other account that may be using the same passwords could limit access for the cybercriminals.
You also need to think about any secret questions and answers that were used, if you’re not already. Be overcautious about emails or communications arriving out of the blue, especially any that require you to validate details or hand over further information (and always take a few minutes to make separate enquiries before giving up more private data).
Now might also be a good time to get a password manager, if you’re not already doing this. There are many options – both free and paid for – that allow you to generate unique passwords for every site you visit, as well as store all your existing ones and evaluate your current passwords to see how they good they are.
Lastly, consider two-factor or two-step verification for accounts that allow it. A really good site to see if your service uses or allows 2FA is Two Factor Auth, which offers you an extra level of protection above your username and password. It’s very easy to use and will stop others accessing your details without your permission.
When an organization grows, so do its IT assets, expanding beyond a couple of servers, workstations, and network devices, otherwise known as endpoints. What once only required simple IT management — putting PC names, printers, network subnets, antivirus definition dates, and installed applications into a few spreadsheets — soon becomes overwhelming. Your organization needs a solution that automatically tracks all of its endpoints.
ITG has an endpoint management solution that will provide you with intelligent solutions allowing you to define business-specific server requirements, help you meet security compliance regulations and manage mobile devices. Let us help you leverage all that endpoint management can provide in analyzing data to move your company soundly forward into the new year.
Visit our website, www.itgcorporporation.com, or contact us at 518.479.3881 or email@example.com.
November 2016 Volume 11, Issue 11
Cybersecurity Tips Newsletter
From the Desk of Thomas F. Duffy, Chair Center for Internet Security
The holidays are [here] and that means food, fun, parties, and lots of online shopping. Online shopping can be a great solution, allowing you to find the perfect gift and saving time, but it can also end with identity theft, malware, and other cyber unpleasantness. Rather than letting it ruin your holiday season, you can take a few simple security precautions to help reduce the chances of being a cyber victim.
When purchasing online this holiday season – and all year long – keep these tips in mid to help minimize your risk:
- Do not use public computers or public wireless Internet access for your online shopping. Public computers and wireless networks may contain viruses and other malware that steal your information, which can lead to identity theft and financial fraud.
- Secure your computer and mobile devices. Be sure to keep the operating system, software, and/or apps updated/patched on all of your computers and mobile devices. Use up-to-date antivirus protection and make sure it is receiving updates.
- Use strong passwords. The use of strong, unique passwords is one of the simplest and most important steps to take in securing your devices, computers, and online accounts. If you need to create an account with the merchant, be sure to use a strong, unique password. Always use more than ten characters, with numbers, special characters, and upper and lower case letters. Use a unique password for every unique site. The August Newsletter contains more information about the dangers of password reuse and is available at: http://msisac.cisecurity.org/newsletters/2015-08.cfm
- Know your online shopping merchants. Limit your online shopping to merchants you know and trust. If you have questions about a merchant, check with the Better Business Bureau or the Federal Trade Commission. Confirm the online seller’s physical address, where available, and phone number in case you have questions or problems. Do not create an online account with a merchant you don’t trust.
- Pay online with one credit card. A safer way to shop on the Internet is to pay with a credit card rather than debit card. Debit cards do not have the same consumer protections as credit cards. Credit cards are protected by the Fair Credit Billing Act and may limit your liability if your information was stolen or used improperly. By using one credit card, with a lower balance, for all your online shopping you also limit the potential for financial fraud to affect all of your accounts. Always check your statements regularly and carefully, though.
- Look for “https” in the Internet address (URL) when making an online purchase.
The “s” in “https” stands for “secure” and indicates that communication with the webpage is encrypted. This helps to ensure your information is transmitted safely to the merchant and no one can spy on it. Alternatively, look for the lock symbol (it’s sometimes green) in the Internet address bar.
- Do not respond to pop-ups. When a window pops up promising you cash or gift cards for answering a question or taking a survey, close it by pressing Control + F4 on a Windows computer and Command + W on a Mac. These could be social engineering attempts designed to convince you to open malware or click on a malicious link.
- Do not auto-save your personal information. When purchasing online, you may be given the option to save your personal information online for future use. Consider if the convenience is really worth the risk. The convenience of not having to reenter the information is insignificant compared to the significant amount of time you’ll spend trying to repair the loss of your stolen personal information.
- Use common sense to avoid scams. Don’t give out your personal or financial information via email or text. Information on many current scams can be found on the website of the Internet Crime Complaint Center: http://www.ic3.gov/default.aspx and the Federal Trade Commission: http://www.consumer.ftc.gov/scam-alerts.
What to do if you encounter problems with an online shopping site:
Contact the seller or the site operator directly to resolve any issues. You may also contact the following:
- Your state’s Attorney General’s Office or Consumer Protection Agency
- The Better Business Bureau – bbb.org
- The Federal Trade Commission – http://www.ftccomplaintassistant.gov
|The information provided in the Monthly Security Tips Newsletter is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes.
Disclaimer: These links are provided because they have information that may be useful. The Center for Internet Security (CIS) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of the resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of CIS.
Image Posted on
Courtesy of BARC Research ©2016 BARC – Business Application Research Center, a CXP Group Company
The IT industry and the world at large have always been subject to technology and business trends, sometimes undergoing major changes, such as the development of the personal computer, client/server computing and the evolution of the Internet.
Over the last few years, new trends have emerged that have had an enormous influence on how organizations work, interact, communicate, collaborate and protect themselves. Eight IT ‘meta-trends’ influence organizations’ strategies, operations and investments in a wide variety of ways:
- Artificial Intelligence
These meta-trends can be considered as the main drivers behind a number of important trends either related to the usage of software and technologies for business intelligence/analytics (BI) and data management or to the way BI is organized. They generally shape the future of business intelligence and – more specifically – the BI and data management trends we analyzed.
BARC’s BI Trend Monitor 2017 reflects on the business intelligence and data management trends currently driving the BI market from a user perspective.
In order to obtain useful data for the BI Trend Monitor, we asked almost 2,800 users, consultants and vendors for their views on the most important BI trends. Their responses reveal a comprehensive picture of the future of BI as well as regional, company and industry-specific differences, delivering an up-to-date, objective perspective on the business intelligence market.
The Most (and Least) Important BI Trends in 2017
Data discovery/visualization, self-service BI and data quality/master data management are the three topics BI practitioners identify as the most important trends in their work.
At the other end of the spectrum, data labs/data science, cloud BI and data as a product were voted as the least important of the twenty-one trends covered in BARC’s survey.
This shows that ‘hyped’ topics or initiatives in early-moving companies cannot win a greater mindshare as important business intelligence trends than more mainstream topics like data discovery and self-service BI, or fundamentally important topics that have been around for a while like data quality and master data management.
Our View on the Results
Overall, there are no significant changes in the ranking of importance of BI trendscompared to last year. This is a good indicator that our survey participants are not seeing any major market shifts or disruptions impacting their work.
Data discovery, self-service BI and master data/data quality management are currently the top business intelligence trends. While self-service BI and data discovery increased moderately in importance, master data and data quality management decreased slightly.
Self-service BI has been on organizations’ wish lists for a long time as IT departments struggle to satisfy steadily growing demand from end-users for faster changes and new developments to meet their BI needs. Enabling the business user community through ‘self-service BI’ is a good idea. Data discovery and visualization, as well as predictive analytics, are among the typical functions users want to consume in a self-service mode. However, an agreed data and tool governance framework is paramount to avoid losing control over data.
End-users recognize the need for data quality and master data management and, in our experience, initiatives in this area are often announced with a fanfare before quickly moving down the list of priorities for a variety of reasons. But at least organizations seem to be aware that the best-looking dashboard is worth nothing if there are flaws in the data it is based on. Business intelligence will not work without comprehensive data integration and data quality initiatives, but these have to be backed up with the right level of attention, resources and funding.
In the next few weeks, we will post a series of articles looking at each BI trend in more detail. You will learn how different regions, industries, user types, company sizes and best-in-class companies rate the various trends and how their views have changed since last year. Sign up for our newsletter below and we’ll keep you informed about the latest articles.
Click here to download the full BI Trend Monitor 2017 report.