Featured Blog

/

On November 4, 2011

Wireless devices and data security. Is your environment at risk?

The advent of new technologies are in pace with the needs of consumers for convenience and comfort.  How easy is it to work out of a hotel room in one of the advanced cities of Asia or Africa and send files for an early morning meeting in the U.S.?  The world is global indeed.  So, are the ri ...

Read More
/

On October 26, 2011

When the insidious ‘Morto Worm’ threats data security…

The Morto Worm very recently became the first worm to use a list of common ids and passwords to gain remote desktop access to Windows systems via the Windows remote desktop protocol (RDP) in order to spread itself. As soon as it gains access to a single system on your network, it replaces system co ...

Read More
/

On October 19, 2011

Security in the Cloud, Private and Public

Where would security fall when our data is in a shared space,  when privacy is of great concern and breaches are occurring every day even in a secure network? Private clouds seem to be the answer.  Private clouds sit in a public facility on a dedicated system with very specific service-level agre ...

Read More
/

On October 13, 2011

Security policies for mobile devices

Companies may have to start spelling out security policies for mobile devices since there are no written ones, or if they do exist, they are ambiguous. Employees are provided with mobile phones so they are reachable any time, any where.  This means the employee may answer the phone while drivin ...

Read More
/

On August 29, 2011

Flash ROBS? What has data security got to do with it?

http://www.youtube.com/watch?v=rJZNYuMclNM&feature=youtu.be Social media has expanded from entertaining and exciting "Flash Mobs" to much more sinister events called "FLASH ROBS". "Flash Mobs" refer to spontaneous dancing or other antics of a group of people while "Flash ROBS" are when dozens of peo ...

Read More

Stay up to date with the latest from Omega