Featured Blog

/

On April 14, 2012

What is an Advanced Persistent Threat?

Recently there has been a lot written about Advanced Persistent Threats or APTs.  In reviewing many definitions of these threats by industry experts and security organizations, here is a common definition of this newer type of threat that is increasingly making the news: Advanced ...

Read More
/

On March 26, 2012

Access control equals better security and less breaches

This is one of the critical areas of 2012. An absolute must in the IT world is to control access privileges to areas of the network that are key to running a business.  Such as data, applications, operating systems... Organizations may use a mix of solutions to minimize any kind of access risk.  ...

Read More
/

On March 21, 2012

Circumvent cyber threats

Cyber thieves are busy staying ahead.  Here are a few tricks that will keep them on their toes and you somewhat away from their bullets.  Following these guidelines will make you a difficult target to reach.

  1. Keep up with updates on applications just as you would your Windows updates.
  2. Read More
/

On March 16, 2012

Using PcAnywhere for Remote Control of POS Systems? – FAIL!!!!!

H. D. Moore of leading vulnerability scanner company Rapid7 has just determined that as many as 200,000 systems connected to the Internet could be hijacked by hackers exploiting bugs in Symantec's pcAnywhere.   Even worse for those in retail, up to 5,000 of those are running point-of-sale software ...

Read More
/

On February 28, 2012

Tips For Creating Secure Passwords (Part 2)

Last month we provided some important guidelines to use when creating passwords for accessing your various web site and applications.  This month we want to show some examples of how you apply those guidelines.  Recall from last month that we have a fixed phrase "I like Dogs" which translates to a ...

Read More

Stay up to date with the latest from Omega