May 31st, 2016 by Jennifer Lough
Call it irony, poetic justice, karma, whatever you like. Nulled.io, a popular website for sharing hacking information, was hacked in the beginning of May. Unfortunately for any hacker wishing to remain anonymous online, the entire database is open for perusal. It contains 536,064 user accounts, 800,593 personal messages between users, 12,600 invoices, 5582 purchase records, and quite a few passwords and IP addresses. Since the hackers paid the website owners to keep such information under wraps, they’re probably just as disgruntled as their previous victims. On the plus side, this presents an excellent opportunity for law enforcement. Law abiding citizens may also learn a few things from the hackers’ misery.
Nulled.io was using the IP.Board community forum, which has had 185 known security vulnerabilities. Supposedly, all of them are fixed, but that doesn’t account for any new or unknown problems. At the time of this writing, the most widely accepted explanation for how the counterhackers accomplished the breach involves exploiting the numerous holes in the website host’s security. However, given that most security reviews for IPb commend them, there are certainly other possibilities. Read the rest of this entry »
March 14th, 2016 by Jennifer Lough
Having spent the last few months of my life in a zoologist’s lab poking at poisonous amphibians, there is one thing I would do well to remember: Never put the toxic newts in tanks with the nontoxic.
Separating the toxic from nontoxic is standard procedure for labs, but companies tend to be less dedicated to separating personal from professional devices. Enter Bring Your Own Device (BYOD), in which the personal devices invade the business zone and make operations more difficult. Read the rest of this entry »
December 16th, 2014 by Pamela Michael
A few weeks back we talked about developing a comprehensive backup plan to ensure that you have a copy of all crucial enterprise data should you ever need it. Once this is done, you can move to the second step of your overall Data Protection Strategy; A data recovery plan (DRP). This plan outlines the steps necessary not only for eliminating risk and hopefully preventing a loss, but perhaps even more importantly, for bringing your systems back to a state in which they can support your business following disaster, corruption, or accidental deletion.
A good data recovery plan will outline two key metrics:
Recovery Point Objective (RPO) – This is the maximum time prior to loss that you will need to have all data safely available at another location. In other words, at what point in time, as you work backwards from the moment of disaster, could you lose all data and still survive. Could you lose 12 hours of data or new work? 24 hours? One hour? Your answer here will determine how often you should be doing backups. Read the rest of this entry »
November 11th, 2014 by Pamela Michael
In today’s age, data is more valuable than ever. Just like we insure our buildings and our physical assets, we also need to ensure that we are covered in the event of data loss. The costs associated with recovering data, permanently losing data, or data reconstruction can be enormous. Regular backups are an essential form of protection against the significant financial impact of computer downtime and lost data.
With that in mind, does your company have a Data Protection Strategy that includes a Comprehensive Backup Plan? If not, it’s time to build one. Here are the five key factors you should consider as you put together your plan:
1. What is going to be backed up?
Read the rest of this entry »