Social Network for Web Professionals

Webmaster Blog

Members blog at WebmaisterPro. Covering topics related to online marketing, SEO, web development as well as software reviews.

Endpoint Devices with the Highest Security Risk and Why It's So Hard to Manage Them

One of the prevailing fears of businesses all over the world is the potential for cyber attacks to hit their networks and steal valuable company data or damage infrastructure. There’s good reason for these fears. The number of attacks against companies have increased this year, and security risks are bigger than ever before. A recent survey from the Ponemon Institute shows that the explosion of personal mobile devices in the workplace, along with expansions in cloud computing, have increased the number of security risks. If that weren’t disconcerting enough, the same survey showed IT departments were having a much more difficult time managing these new technologies and risks. As companies prepare to head into the future, they’ll need to come up with the right strategies for dealing with these new threats and shoring up endpoint security. (Tweet This: A recent survey shows more mobile devices in the workplace has led to increased security risks. #security #byod) Security risks have always been a problem for companies, but only recently has it grown dramatically. The same survey from the Ponemon Institute compares the recent numbers with the previous year, and nearly every category has seen an increase. Endpoint devices are the primary concern,...
Rate this blog entry:
0
Continue reading
10444 Hits
0 Comments

Web Design in 2014 Needs to Take Google Chrome Seriously

Web marketing is a complicated beast. You have to write high-quality web content that people want to read, you have to build a vibrant presence on social media platforms, and you have to focus on search engine optimization. As eCommerce levels continue to rise -- web users are expected to spend $1.5 trillion in 2014 -- those tactics are only going to become more important.  While those methods are important, they are arguably not the most important tactics for success online in 2014. Web design is the crucial element of any successful advertising campaign this year. Quite simply, your web design is the lens through which your customers view everything you do. You can write great content, but if it's published on a poorly designed site, it won't matter.  Understanding web design is often reduced to learning code and basic design principles, but to anyone in the industry, it's a much more complex science. Take, for example, web browsers: web pages need to be designed to work with the most popular browsers. This year, that means making sure Google Chrome can display the pages you design as intended.  How Microsoft Lost the Browser Wars Anyone who grew up alongside the internet...
Rate this blog entry:
1
Continue reading
5629 Hits
0 Comments

5 Predicted Cyber Security Trends for 2014

As disturbing details regarding the depth and breadth of Target’s security breach continue to surface, the clear message is that organizations need to implement greater cyber security safeguards to prevent future breaches from occurring. For as the Target attack shows, such breaches of personal data not only pose financial risks, they also put the company’s reputation at risk and open the doors for legal retaliation. In the interest of creating better safeguards against cyber attacks going forward, here is a look at 5 predicted cyber security trends for 2014. Greater adherence to NIST standards and guidelines Under the Executive Order “Improving Critical Infrastructure Cybersecurity," President Obama has directed the National Institute of Standards and Technology (NIST) to work with organizations on developing — as stated on nist.gov — a “framework of standards, guidelines and best practices to promote the protection of critical infrastructure.” While developing this framework has been considered a “voluntary” practice on the part of organizations thus far, heightened scrutiny of security practices by the FTC and other regulators will force organizations to more strictly adhere to NIST standards and best practices with regard to cyber security in 2014 and beyond. Otherwise, in the event of a security breach,...
Rate this blog entry:
0
Continue reading
8660 Hits
0 Comments

Mobile Devices Users Everywhere Are Realizing the Implications of Their Lax Security

Between the exorbitant financial losses, expensive legal or regulatory infractions, and shameful reputation damages, businesses paid a whopping average of $7.2 million per data breach, according to computer security firm Symantec. Across the country, mobile device users are realizing how mistaken they were to be so lax about their security. Everyone, from medical professionals to politicians to social media addicts to small businesses to everyday smartphone users, are suddenly feeling the potential impact of security breaches and data losses, and looking for appropriate solutions. Over 80% of pharmaceutical and healthcare professionals routinely access sensitive records while mobile, according to a report in Medical News Today. Of that 80%, the vast majority (90%) use free file-sharing services, which do no have the adequate security necessary to access such sensitive documents. This puts these medical professionals at risk of breaking HIPAA codes, which would lead to serious infractions. In addition the medical industry, the federal government is also incredibly vulnerable. According to a study titled "2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between," almost half of government employees who rely on their mobile devices aren't practicing several essential security protocols. The security issues don't stop with professional industries either. Recently, a...
Rate this blog entry:
1
Continue reading
6432 Hits
0 Comments

7 Biggest Cyber Threats of 2014 — And How to Protect Yourself

At the end of the 2005 blockbuster film Batman Begins, police officer Jim Gordon makes a point about crime and escalation. In a nutshell, he points out that no matter how sophisticated law enforcement becomes, there will always be those criminals who who are willing to take things to the next level, and as both sides work to gain a clear advantage, very little ever actually changes. In few areas does this seem to apply more than in cyberspace. As computer systems advance and grow, virus protection firms work tirelessly to create new defences intended to keep sensitive data safe from the criminals who would steal it. And as they do so, black-hat hackers around the world put just as much effort into defeating these new security measures. And so, as we enter a new year, we’re faced with a new crop of potential cyber threats. Anti-virus giant McAfee has recently released its own report on the kinds of cyber-threats we may begin to see in the next twelve months, and the top contenders to make the list may surprise you. Here are seven cyber-threats to look out for in 2014, and how to protect your information from them. 1. Mobile...
Rate this blog entry:
1
Continue reading
4330 Hits
0 Comments

Disruption Online

It seems every step forward made in computer security technology is accompanied by two strides forward made by hackers and crackers whose sheer ingenuity must be recognized but not condoned. It seems every step forward made in computer security technology is accompanied by two strides forward made by hackers and crackers whose sheer ingenuity must be recognized but not condoned. The disruptions caused by cybercriminals can be significant and substantial as they launch devious campaigns ranging from financial scams, hacking into sensitive and valuable data, disseminating damaging viruses and much more. What is the cost of this online criminal activity? Well, the German foreign minister Joschka Fischer estimated the worldwide figure at over $40 billion each year. Needless to say, stopping cyber crime is top on the list of priorities in many countries around the globe. Recently, the Metropolitan police quadrupled the size of its cybercrime unit. Now comprised of 85 officers, the unit has its hands full with the investigation into the “hacktivist” groups Lulzsec and Anonymous. Teenage members of the groups have been arrested and charged with offences under the Computer Misuse Act, the Serious Crime Act and the Criminal Law Act. They face up to 10 years in...
Rate this blog entry:
1
Continue reading
2248 Hits
0 Comments