What if every day a new threat was on the horizon? It would be seemingly overwhelming! But what if every day tens of thousands of new threats were appearing, and the majority have yet to be identified? Scary as that may seem we must face reality and realize that is the world we live in. And for that reason there is no way to protect from malware by only using a reactive approach.>>
We all know all too well of the massive Yahoo hack that compromised hundreds of millions to billions of accounts. What we didn’t know until last night was how much that sweeping compromise of security would effect the valuation of Yahoo by Verizon.>>
In the last few years there has been an increasing hype regarding cloud-based offerings, from outsourcing the office file or mail server to powering entire complex web sites, collaboration and outsourcing of voice over IP, CRM, and even providing off-site backup services. The term cloud has come to mean just about anything not on your local network. The broadening definition combined with the reduction of reliability, security and accountability is a troubling trend, to say the least.
Data breaches grace the headlines at least once a week these days. Companies whose sensitive information has been compromised by unauthorized parties on a massive scale. Many of them suffering from irreparable financial and reputation damage.