DDoS Attacks Gear Up With Ten Times Greater Power
Many businesses may believe they have prepared their Internet defences adequately against Distributed Denial of Service (DDoS), but the attacks they are fending are about to become increasingly fierce. Prolexic Technologies has already seen the devastating capabilities of a server-based zombie assault which floods its targets with more than 15 million packets a second, and it warns that we are likely to see bigger and more complicated DDoS attacks in 2006.Tuesday, 25 April 2006 04:02 EST
Easing the Pain of Systems Disruption
Downtime is becoming more and more painful for organizations. Consider these statistics: According to Infonetics Research, large companies lose up to 16% of their annual revenue due to unplanned network downtime. Additionally, a recent survey commissioned by Symantec found that 30 percent of respondents indicated their company incurs at least $10,000 in productivity and revenue losses after suffering a server failure.Monday, 24 April 2006 04:14 EST
Improve Privileged User Accounts Management
One of the biggest issues facing organisations is the elimination of bad practices related to the use and abuse of privileged accounts. Organisations frequently suffer from unrealistic policies that are being bypassed, usually because of a lack of resources, or having no policies with the result that there is no control.Thursday, 20 April 2006 05:23 EST
How to Steal Money with a Virus
When talking about the Internet and associated technology, it is quite common to talk about cyberspace. A parallel universe, virtual and intangible, in which everything that exists in the real world can exist through a cable. Modern technologies have enabled the creation of this digital world in which any experience is possible.Wednesday, 19 April 2006 05:12 EST
Business Process Management Agility
The benefits of automating business processes are well recognized. Business Process Management (BPM) software is helping companies accelerate decision-making, cut lag time, reduce human error, increase consistency and conform to compliance guidelines.Tuesday, 18 April 2006 04:16 EST
Review: Acunetix Web Vulnerability Scanner
More companies than ever are using web applications for their business, yet only a small percentage of websites are tested for vulnerabilities. Through web application vulnerabilities, hackers can gain access to sensitive data such as customer’s details and corporate data: Gartner study reveals that 75% of cyber attacks are launched on shopping carts, forms, login pages etc.; 8 out of 10 websites have at least one serious vulnerability.Monday, 17 April 2006 06:43 EST
How Security Threats Affect PC Performance
Security threats are everywhere - spyware and adware installed inadvertently over the internet, viruses transmitted through email, keyloggers penetrating your firewall, malicious code broadcast over peer-to-peer networks. Here are five threats that will reduce system performance, destabilise your system, generate unusual behaviour, modify your Windows Registry and hog your Internet bandwidth.Monday, 17 April 2006 03:41 EST
Security Best Practices Without Question?
Are you feeling insecure lately? No, not about yourself – but about your organization’s competitive position in the marketplace? What about its ability to meet client and business partner obligations? Or, it’s ability to stay out of the court system and on the good side of your industry’s regulators?Thursday, 13 April 2006 07:17 EST
Build Effective Security Awareness Program
You’ve developed a world class security program. Your technology-based defenses are cutting edge. Your security team is well trained and ready to handle anything that comes its way. So you’re done, right? Not quite. One of the most important pieces of an effective information asset defense is missing – employee awareness.Thursday, 13 April 2006 04:10 EST
Magnetic Data Recovery – The Hidden Threat
The majority of today’s businesses rely in some way upon computer systems to handle the tasks of everyday commerce. These businesses are increasingly using computers to work with their internal and external documents, depending more and more on digital storage every day. Most attention has been focused on well-known problems such as viruses, exploits, etc.Wednesday, 12 April 2006 10:38 EST
Next