50 Folgen

Welcome to the C-IT Security website, where corporate leaders are informed of the latest news relating to information assurance, protection and privacy. This website is not just for the IT professional, but any professional who is concerned about his/her company ending up in the news. We will brief you on the latest security news around the globe and provide suggestions for high level controls to explore in your organization. By no means is this podcast a consulting service. The idea is to foster creative thinking for the prudent business leader to make intelligent decisions based upon the impact other businesses are experiencing by current threat actors.

C-IT Security Podcast Charles Whitby: Business Security Thought Leader

    • Wirtschaftsnachrichten

Welcome to the C-IT Security website, where corporate leaders are informed of the latest news relating to information assurance, protection and privacy. This website is not just for the IT professional, but any professional who is concerned about his/her company ending up in the news. We will brief you on the latest security news around the globe and provide suggestions for high level controls to explore in your organization. By no means is this podcast a consulting service. The idea is to foster creative thinking for the prudent business leader to make intelligent decisions based upon the impact other businesses are experiencing by current threat actors.

    8-25-14 An attack targeting JP Morgan and Chase Customers in the United States

    8-25-14 An attack targeting JP Morgan and Chase Customers in the United States

    “Diligence is the mother of good fortune and idleness, its opposite never brought a man to the goal of any of his best wishes.” -Miguel De Cervantes JPMorgan Chase customers targeted in massive phishing campaign http://www.scmagazine.com/jpmorgan-chase-customers-targeted-in-massive-phishing-campaign/article/367615/ http://www.darkreading.com/jp-morgan-targeted-in-new-phishing-campaign/d/d-id/1306589? C-IT Recommendation Provide social engineering awareness for your customers. Ensure you communicate specifically how your organization will communicate […]

    • 8 Min.
    8-20-14

    8-20-14

    “Out there in some garage is an entrepreneur who’s forging a bullet with your company’s name on it.” -Gary Hamel Cybercriminals Deliver Point-of-Sale Malware to 51 UPS Store Locations http://www.securityweek.com/cybercriminals-deliver-point-sale-malware-51-ups-store-locations http://www.scmagazine.com/ups-announces-breach-impacting-51-us-locations/article/367257/ C-IT Recommendation Create new non-intuitive usernames for POS accounts.  Disable  the default usernames. Use Strong password for Terminal log in accounts and change them […]

    • 9 Min.
    8-19-14

    8-19-14

    • 7 Min.
    8-18-14 The problem with former employees retaining access to companies they no longer work for

    8-18-14 The problem with former employees retaining access to companies they no longer work for

    Bulk of Ex-Employees Retain Access to Corporate Apps: Survey http://www.securityweek.com/bulk-ex-employees-retain-access-corporate-apps-survey http://www.infosecurity-magazine.com/news/uk-smbs-manage-exemployee-risk/ C-IT Recommendation Verify your company has an effective and enforced access control standard and policy which requires that access be removed when an employee transfers within the organization or leaves the organization. Use Role based Access Control. Roles should be specifically defined by the […]

    • 9 Min.
    8-13-14 A tech support scam targeting trusting users, a report describing 2014 as the year of the data breach, Microsoft’s plan to stop supporting older versions of Internet Explorer

    8-13-14 A tech support scam targeting trusting users, a report describing 2014 as the year of the data breach, Microsoft’s plan to stop supporting older versions of Internet Explorer

    “It is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change.” – Charles Darwin Windows tech support scammers take root in the U.S. http://www.csoonline.com/article/2464030/security-leadership/windows-tech-support-scammers-take-root-in-the-u-s.html Article Resources Malwarebytes blog on the scare tactic https://blog.malwarebytes.org/fraud-scam/2014/08/beware-of-us-based-tech-support-scams/   2014 So Far: The Year of the Data Breach http://www.infosecurity-magazine.com/news/2014-the-year-of-the-data-breach/ C-IT […]

    • 11 Min.
    8-12-14 The PCI Council publication advising companies how to ensure security compliance with third party service providers, New malware that hides in media files, Microsoft patch Tuesday bulletins

    8-12-14 The PCI Council publication advising companies how to ensure security compliance with third party service providers, New malware that hides in media files, Microsoft patch Tuesday bulletins

    “It doesn’t take great men to do things, but it is doing things that make men great.” -Arnold Glasow PCI Council Publishes Guidance on Working With Third-party Providers http://www.securityweek.com/pci-council-publishes-guidance-working-third-party-providers http://www.scmagazine.com/pci-council-releases-third-party-security-assurance-guidance/article/365658/ C-IT Recommendation Require your third party service provider to provide a report of compliance and require the entity to conform to conducting a risk analysis […]

    • 14 Min.

Top‑Podcasts in Wirtschaftsnachrichten

Zuhörer haben auch Folgendes abonniert: