• Apr 26
    2016
    You have probably seen this before. You go to a website looking for information or perhaps a product, and a dialogue box pops up that says something like, "Hi, I’m Melanie. Can I help you find anything?" The dialogue box may even have a photo of a young, professional looking woman, presumably Melanie. If you know exactly what you are looking for at this website, then Melanie may be more ...
  • Apr 19
    2016
    A few weeks ago, I wrote about the trend of criminals using counterfeit email messages to dupe employees into providing private information and files. The technique involves sending an authentic-looking message to an employee the criminal has targeted and extensively researched. In the blog post, I wrote about a case in which the spoofed message requested all the employee W-2 forms. But there are other variations as well. Computerworld recently ...
  • Apr 15
    2016
    Anybody who manages IT has experience with talent shortages. In certain areas, such as security, mobile app development, and big data analytics, there just aren't enough qualified people to hire. It’s a global problem, and it isn’t confined to IT. According to Manpower’s 2015 Talent Shortage Survey, 38% of hiring managers are struggling to fill positions in their organizations. The problem is worst in Japan (83%), Peru (68%), Hong Kong ...
  • Apr 05
    2016
    If you're responsible for the success of a business, you need to take two broad approaches to protecting your information assets: 1) train all your employees to recognize and resist intrusion attempts and 2) train a cadre of specialists to monitor your network as a whole and respond to threats. I have often written in this blog about the advantages of 2), here most recently. To briefly reiterate, a team ...
  • Mar 29
    2016
    It's clear that the cloud is taking over. For the next five years, observers expect an annual growth rate of 44% for workload in the public cloud while "on-premise" computing workloads will grow only at 8.9%. Right now, an organization on average uses 545 cloud services! IBM created a great infographic of the five reasons businesses are adopting cloud computing technology: It offers better insight and visibility. It makes collaboration ...
  • Mar 22
    2016
    Imagine you work in a Human Resources office, and you receive an email message from your company's CEO asking you to send the W-2 forms for every employee who worked at the company last year. You're conscientious, so you quickly gather all the files, attach them to a reply message, and hit "Send." Now imagine that the CEO’s email message had been spoofed, and what you had responded to was ...
  • Mar 15
    2016
    From where I sit, the cyber security training business appears to be growing very fast. But the Global Economic Crime Survey 2016 published by PwC (née PricewaterhouseCoopers) suggests that it still isn't growing fast enough. The survey, which is based on 6,337 executives worldwide, covers all economic crime. This year cyber crime was the second most commonly reported type of crime, up from fourth in the previous (2014) report. Cyber ...
  • Mar 10
    2016
    Microsoft, Apple, Google, and Amazon, as well as IBM, Oracle, Hewlett-Packard, and Cisco all are involved in the cloud technology space. According to Wikipedia, there are at least 95 cloud computing platforms. Every cloud provider takes advantage of cloud technology in their own way, and until now, the only way to learn about cloud computing was to learn about a particular platform. But cloud computing isn’t a product, it’s a ...